1131025a0462976ea07cf5a638b0a8891058fb1d6c063f0b005323898c48c97", 0xe0}], 0x5, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x20, 0x2400c8d1}, 0x4000) [ 1639.393396] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1639.910192] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1640.147745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:14 executing program 1: gettid() r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) stat(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000240), &(0x7f0000000280)=0x4) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000140)={@local, @loopback}, &(0x7f00000001c0)=0xc) fcntl$addseals(r1, 0x409, 0x4) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc00000003000600000000190200ee00e0000054d81458186fe8b90002000100e80100000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000c440)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000380)="15008ae4472b3905d72e1e08d0a6c55d731ec56d4bc71dd9b0556ad95fe7450ddf9274dedf1b267a2498920cabe50dfa095d91f6bfbc96bc051fe45376ce9bb4f73b6aa353b02b95c1ef80df95e3d49cc0f99b9f66a9f549d4529d235efec0febcd3d3bc61c0ef9a8b90f2ae9ae54cfc8a97aed9e86d1b8668506ea324eac6d36031e47cbe10949d169c4afef99e3a10646fab4c56403c1af667c74dce1f31848c6aa2a6b9c8e1de96ff1786e0460f46468efce7d3a7c5e8791d0132", 0xbc}, {&(0x7f0000000440)="38ebd8d63d9f2569cf25300c642a92145552f339e4a563a96ff18afec65922e8a27d78b757a9699d5b768a6c20e2da1777977ca525e6ef388565d7c848ed68c5de0b9f3bbe20f93b85a70ae12ac3e790a26f1f9b1a3acee28aa9b86548493c7a4da2b8d00a53bd07627ea15fc0612d26b7ab4469045c2703897ff6ec3824c1a07713c9350690697c6d7b9646378260c32d", 0x91}, {&(0x7f00000002c0)="bb87d01ebf8b", 0x6}, {&(0x7f0000000500)="9b5af759d56e6700b28d0763b389a1548bc458e8c446f7cc098b9098c591ca9553fbfc442488212aa6dca2e90969d529def9c86863a178f99bd140cf8d0aaea533488a08e44dd0b60f2ab2a699882ea74d954968f087c93355beae050f8cbde30a53ecc48f1009ec377d9c51af3352a61a2aed94a32e6f3c9827497696cf6becb701ce5873a8bbf22dd66768e5f1f77e8f7856e71b388e77ea47d542eea4d37e8607f7f043c6acdeb568967233602c485edf8126c58787f505e38e1e1a7ab1c78470dc8e5b9f1aa70ca22a8ff3819f8b899ca8973c8fbdeb4a64a0e52559", 0xde}, {&(0x7f0000000600)="9309e29378a1aefc8d61982c39dc911cd82d08ae5fe6c0d6f6eeaa56d0500e339b7048ed127fe0eda5ff4b6d866f5ceb7aec6c38b5898e7bd625996f5e6eaf4e9522eadf83038d880eaa74eb3b60654a4b3767e778384cc068cc22c99e4daac59ef36407ca4a6d436f23def2ec096fa4f01c5ec4450dc0509bbba555346e7aa4d82cf841d8f4e5b9be0f1da9347784b66b85d1414e209d8a4d19e750a9d18cb77e9a98e1f96eac568f8f10c464ee9d71436b71fe2d719dd0c4d67feec53806c4d60652ceefdf53606365d77540ab64b772dfce2ee3eb16aeda99a2d75df2409eb1d3bb0a6beb3065f66d8ce5749c996901e993e60409b803822c96afd65cb60321184dbc227ef571af3b682d13c1b8e1153344a0b372dd34a39842c2f0206d338bf8c923e92ec94b7faf53f29f0dcb5bd654415240cf86436b465e0bcfb3951397be567094dc8d18facd11d2941f0f26615e57f16fec7ffb04a5f1ac6e9b2493c8144f226e48570b4cb6cccc137575fc481eba1bcbde3f1723034a6609caa5ca9b4af1cc2c46bf4d57fe6e2ef689f93efdc1f13f38a4fe704a56d4af73caca7fb3afaa5a6278c67a2c37235126d2b08680e7fd3959f3097d975e1d1b730a21e6fb4c4fbecfe381c8836b70071c6d859c0e3ef7da972234120f6875643223b6b7a4366ede37cf23934a2c49d529040d6b8b4676e97aa88458ae6d045b5161549a38595c3ca2f7368f6aea1188a754eb2e590834854b9a683d46f22a0d009248bfd906760b4c922745ca15cba3ee397f4db5b1be50aadf34acd99ec9cea367913b3865afe16de8dc286efa3adfaa5b3c32bb2ffbe52e8027f1b8dff36bc5972aa22f44f1d0921ee90c5c9dd12b89ffb8fdc0d1c3ae092f1f4dfaf60c9d1d22a9116d910bcd9aaccbe5176e71d1d565b61fb60882a756bac19672f16ecd9da5d88f61e7a07442c62d0d1abf42100fd91415b61a972292ae392e464f01c29fd1974e79e4efc784c73679a175510924e2af11025a1095cc90331c8429c0a47696115ec90680cfcf7cdcf2222c12aadbb6da223d7577bdffd55970ad327cf2a7b6bb8c052427705826ff13e8be32694aeed29806a95889ad3fc7fb65ead9d7c0ad19c135acd623649ffacca21e676bb9654aba9fa83459f7634101de6cec29962fd7302070bc293bda442b1a66843d6b3dd09224cc4bb4ea25eb5e5504aa103c615e5d4b09eb1d6323f1d72d210c062d7d783fd574e4a5426f528da59f5fc24bf63344f589f4adddd37b9ffc4de9acabe87e7f65aee34c9c21ef362c757a41846b794ede0d781783e3d3bb6484c302edaccc3aedb9d81061c2c131b20c6bb0ab336cdd2a053d056beaba85e4131c143715cde06c3400baa5c4de5a7decdb5bd4c9ac4b5bf4273cdb8cdd8a1bf357b72e6fd50e1fba46b974cdec2649f6dc8674a6368dd1e7d0d936c54f86a8d084a3c5573c3b73025e816462a4967205d9a5746cd5cee45668286c2e084b66d5f2f545464a27ff2c866d4599b10a3518829a8f701deef10e876c291af78b2d2741162da39a6277975a36d2c033f2981fc2d59ebfd808ec8108edab21b55649668c5164278fb7657f8f37b7cc6138ca572e0d99753d52454c7f313869b51ca370424efbcb43e8f5b3da9e8c117f543ec61c8d133c23b6e51590513478495d316655249cc19d357dd9f2a797abd48c9b57ef889a174ffb7edf896b2f4bcf1ece8437f4b064302daeeeb447358a37b47cf1b03936e0263b7178019a6671aaf5c9efbdb0c08be96353de9b7df79c224f7b89c1f45d06ff36f6bf2f897fa2da07e58b06eb5f89bceca8680963886ff496d5aa9223745da5b62063cae2489bdb450bc30ffe88237dd828f4ec34b8a04b8d74267a688b57a4142e80fc55ea228bd33647c25e5069925a6468cb8641838ba4bea91ae9cce92fa0879e08b25cd1d31bb1ca880cc47157deb2450ab62d731c1a40223e4dff7ee9c5633ca2f4d6b298045631c3e872e32fddfa79a67695796a94899099d97ed3fc6459b2dd1579d03c99bbc20487cae4cf488230c97a7620d79e62dc769185fa1fe83f69f756cb888201ada75d1c06135725706385cbda82d874bd2e4683ebe3a825b7a29b911ab02a3402659e5b21b5608cea55c49ebc56a8d66b4330411c3ad9c770cbf51f61ca5887d33e8caea12940edf0ced0904b41d48c13513cb21fcc66e7f2e56e754d43f5d9a9f1beca38423d12ea201d70a727f55931e61fe3c8346ed9cc4f31c7c1952a6680cbdda9d86166c3cf74397023d648d4ca12cd360486f764423442014c91093375424cdf400824a3a3e51f6c15006745218a70fd789a3f3c351b6d77e436be82f0321883944aa6e8f1eaa9e88d87bcce1cd8cb52588fd220eb81e6cf908c0597bccba6c77c183673fcb3e8afd5acc3d4b87d98a347a2edbbc98b1e749c2b762105ef2edbb915b18468cea0af222cc04c59dcb5f79144659c71f095be34909e7ce5007d424e2fcb9ed9914128a29a0468fb1ef2b298456b45a17aa6f91706b4d93dc168cc02ba6f56a162738cca3656f3dec3c726c5f024bfcc793affdc1a5fa3104b45ec164ff914d6a62da3ff85f871ca5a2bf5ab5e7daf8aecbb84e1511dbf48ee97e06eb198c1b868cd2864e4e5a6f041c03aafd7985c83fefeb812fdde2e60d1fe2dc0c1739fcd4b97cb714028dfdd0866c13ce6bf45076dc86808f14672093089f821f67267312150261730c332a86a9aa4da395ed468ed40930a185bf315de371cbcebea3789b70727521b30c441d6b472b0acb9bd1105664580a9c7749f418a5d149e819f01d3414ce7b846b744443c2d5aa2da15c00ac27661bb30177e1dc427dbc1215f1617662a379e24280c7ed9fb154a932450b6a6baf9de33c02affa6bc96678dee766af41d1aeea416b6b353eec621a3aec098b93e154d38049b3cdfcd391c15952352451482b48f1dd157ce30d0bf75b0b77138485429b9fad769b54daa0bea67044f8a77db8a2888027830b31a4879098dad872ef3bd6bb9e57cf06163f0c4882b548f49f9e68af27f9c831df926a965853bc1e40e6619d1d19cd29e037af9aa6524de6f8ffd4a77582814522c90d03eb662e911bc429643fe8613720540fc2e49a25e636a53ed2606e2153ca3b34f2c6bccb953b95b4fa6078db6f57bd5505ca231717b46e8eee9ff0f3f03f753dbb6ba6e4b2682a53a36e95cc7d078008bcc006af34ffe1d8a4cf04a6f1db7ade20de0fce6f7b63d35e0f3b34556144cbd90d838667c67bcb3ec3dc3a3ed5f8323567995de91489110aa05e48f0c0378a60b7d6047dc6ad69a92e0503371129fb98785b81079a52030741d4e9a1d5f9c5d4f42f89adae25992b519ca1b4d9216518ce1aa49a17d8f64654a6b44336d8a9f1b6c013a526449b1497caca3b65288b0910265546b6459899b3dc5899a6df33b7f0cb2dfc06a07d8e42bfc927dfd802a849620a9c0c1acbd9266f0088304c55288a6838a4ef5a1e98785bfc0c3499d9d802c475a706148814df70410d5fd16521c7803972a94e13b2dae6d4ef3db3b1a57ca6b99796c8c5af819890760f96abb0cd80a95635645d8e3a18400a209d7d5f4ba40fefd685a119f2b27662b08a2e46bc4e8243913e70177b6a826f603cd09cf953e7ee6262f31532ec720b78ce023242abae1c6498f4854ee4212eaafde8e67153fd7a9989bed18afa5780e3234fed09eece24818c9493df3f74aaf67f3c1ad05e8b394b91519bcb5c087b1b51f04c8f6d6c7639022a61a189d590b5510395fb3253f509f9c4d4c865b7addd3681dd3e3477ad620f3765bf20cf55a59e3a4f2f144fa33ea2302b04de1493c89e8e72ed32198854ae935c00b97a323cb7dcee0362eb27d0b605ace04752124b40e26c9d5bc915457eb3b01e97a2209fca77cd85839e8a691aeb30cca810c526dd4e57f7ca8da2977b704b3202edb34f0caa8716ec21c51a6ed89d769b5f605e306051f9618a368505580178241630adf58cf50377d3cde95638d08046d9da1cb5329ac0107bac4cf141831636dca180b6797dd9376e0636b84c631b0b6138aea3bab8ed2098fd6c722e8de621fc330bc1441dfcc85e499864ea93df0394e5efc258499e66b651a506d02568058ade635d8767d5dd56710f4a0cdacfea8aa5d83fb1bb6c0fb01aa263a2e2e9db9cd8d7c8cefa38bf4c01ff7516894aa8c2955f6b632e6eb8b1fdc8c7cd91b7a692fdb52db74c9d91dc21514ae4e802b4fca11ad6b983ae1718016c7bdaad77ba72c74ac64a0282e2928f5ade18679c673158ffd3726898b37fa52ad6992df085cff09d297587ba026689cd5344a6ba429b2dffa43534ff5f91011f38f740e962a7940a381873267f18904b1d2a2771c9217612132744754cfa8d0bfd0913c76536078dde5abf3179b812751290c32ba6bcdc482c6736fe828d937a8446867b6b0591c62c02f65ced006f730d8c11405c94bcbd3a18006c7f1bff78087c560e5162f512b06f519d864528b4982c0301ea11039c758fda1373f9bb1a03df4bbee10925a3b126331f697a499461453ded316c8ffc17b5c8e8f6e3dd8e8408e5b8cf43c9149b76437cf9f1fd8f2a5398edb011be4fb57a36ba0a1815338bbc8671e845b1f22e6ca4c5f20c120b315093033f685ffdcca38846fa90048e9243c7985bccd6f73a12a17cd866be576af1ae0c0529988f2bac62c9c38abb3850bf45502484c7e5cc823897ea7761c724e5e7884b84e2d4fc94a5ceef846e0f0ecd38cf23e9c14089d0acd813d75397e73dc5bbe82a5ce4dc265279cf2c4f8df55dd2d60959fbe8f2b38e132047a8024311cd11dacb63c2367e0c67d7239574cb1f0435668d42a23a2f2b88404cf545b0e90cacd82b8faa455b2f720932822a061b3249de9b91ca05e36911718a20735666fa572019b7d95e6a0353b856e6bbb2ef2b6fd96468514035a29147307c326927e7f94da5238b7cd514aa335ba7046f5fcb9e689e750bd72d4014008b276f40567c710c8e1de1a3e9d8b4861cbe75ae243a7ea0083018bcc6ec37830c8f79a51b8e706af11c326a58816a3ec63f8624fca9449ef2eec646783a0495f4ec061d48b20a4cc59f9e9f50304fbffbe3ed91d25da20b02cfa92eff2788616eef4c2776599ff08ce994b2e2795047b9022a31152e5b8bd8c7866a53e064d048f9a2d29c1815612749a01e27b2eda42166e109940b2fb96ed59bdab9947b70677ea29ee290cd66dcaf55c98e946872cd48f25ec4b071d2dfb95df5048ca92a1ba7a4cad946d8f6bad3ce313ce1ebaf14f4b4b9ecd2556cb1efd3ec54b6f06417c9e447c43f87f48621a269509221ad36b884bebf36396c32b7e3eade629aef6c103f307251a5bf7c2aea9ba130b40dbb952b3e8c055d8a3231d", 0xefc}, {&(0x7f0000001600)="efb8228e33577321b90391b4ab189158b540ef63bead04381447d7126f7139792f44b6a8411f2e7bf828ccd5818d70340b4a9a55c42f7db5919c1709122cf340a78ce3f14b7286de06ba7e3f8ac4f1a47a53968a385953a83bd5338eec92ea7ef929d1e6f79a67919de7c38de9e17f68c2569c513b03663eaae5b6cc1b3a8db919e831422390239d7ac7662967f9948f38a5e24932769744562c15808f9e2ff2aae03c957a241a0ccd00bafc6ae6141f0a6455e8ffc7153c62ee964ac5e94cf1c8c391ab310777c92b1fe34acf4339a3810cbe1a6b81bf66c5edfe6643d0592ac2b779", 0xe3}, {&(0x7f0000000300)="2b49d01fa65f", 0x6}], 0x7}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001a80)="e3d3eee1e49d201cbc36a97751640ff914ba2eb251f677dbfd061b732f2f8d8647e4fe75715f7e4f01baec942f9d3283e7e307101e5fa951f92d43ddc2c41b37193e044bacbaa60ef584774e73271270b5b0bbf22c5e4caf234aeee645f4904d38caee96a3d0852a116277be02a02814ad48eb589824243031c0a29b9cb622d616c13adcc20c28c41b43aca6d5065e3443e7a1d79081b2b7db0ee6ee14354424dbe7237b9f7d2e09ca4f241905e21cf33b19d9269f0a209f77a215fd070aa9d128eb489c5b474446ae18db471bf1c7566820510d936e8fc07189bfa16197ea415475d598482c508bde2021a2c260f01e8385b544fc89cef586a641b7c201be32958c0988fddc378511e3d3214e7b50faec6d97ea2a3ce29801798d4411218eeaee18e958efb9126cdb213b8de6ac97fd7119f006b7d67d0a18e3fa855d7fd1f21c48377a96db78f7df1f176ca359a1d1f8008dc21b7fac4a16b25b90b0d9ce3e33b9c5cf56393e98da472dd2d5fe161e80903d0f4fa76139d62af3d07443908cd25b4d246ddffc369fa3fa1bcae06dca1835f0b6d4ead9fd45a9b3e0b220a1b4f9736457692c99bbca07012795a018356f4e6e02825afc6e948e40c8945979a72c946d8162743eaf8b098d94f631dc8fc8c352d93a420bd1309098430a718e19926c868fb879255bdcab1778bb49c92d64e59872130f9279f3d7b5b0db68423951fa1cfa9a299f4e8424d53361a23e54adbaa61556fe9634eff8f8f22bb3d038fab482d34d18d22d5debc67e0cd4b33a1cf68fb2830e9d5c3c1f5ade0ef36ab168f2d957cca4d5e44ee83d244714f912892373804ab681d8cd9a1a90ba563c84a5e6e1715f3c9b6881bf2aadf5bfd2e3f8626c17c5cd153b9ff6ba5c0163845e027e05af6fcef763f4c3bf236da6c67770d96b6c831731f564e380bde0e61787081d809c717bf9ce81bdf72708c5905665b56691b5b6dcbd05b9ed471b25ed51ff5ee412d207850dd00b4d4369bd6d27f017ed05a687a56f6f2da4294b1808f251039f14e662072715dd366d4a69a6d100334316116a310069c39a2caeff6ea415876038ef41195cc917f0bb93f75b7e532b20bc04bbc817f19a21dd3e0b736640f556025d9a45454dcb3f13e4f20939584bc11642dcd943b61d8d2715f71608aff18ed8ded49a7b7d5dc11c3efe12ed371e37d6e19a9a5b8a90a0002506468e9f92ab715d813b93bba0bb690c0a5129f13cd10cad41d49de20e043bce83a9c1fbe1ba5bd1d839f05cda83a1089860f578f384bc85edd90f47ee491ca33e99e2c0a8530247fc0f10157b4f241681b7108795df9c1b1dc50f81dd4ea700d603c4102b84bccaf34fb704338cc34532436ee13d6e34ba34415b38c4dbc186f94a40823d3c5be5a2be44126a496f0ab8e3202841ba74ffbf604cd0c8bee98deb1da044658aad43aa25fc086bea2fcdc735ddf2848ae392ebafadeb09e085140d9f8813c0ac8331426b54217f2f180e1a9a3c2992cf9045686c75d5e50e4a85720c9ca5dfdb7a8f6738b5efce954871de257aed4863a2e8714e8e53320e9d85813864e85418d20080e91f7f60c402a2635af44945a8016ff4b62b8bb393e61cdd434bdd74101f25806e3288a88c101082bec5b78a933e6a6e357610b7b89294734ac9e8524a51615ad127f8851390319c51230634299eb8c9d4dcaa2f0c0a7a53065df669073fd8b78646cfab8a4366d3b9fb267c424a89df2feeadbf8f8d27ca9046ece7ecdd02b197351ff7e749684c71bb19eeaabf7216972228932729562240ec3da9dd2beff88ee10ac7f0c6ae1d428356aaf740641f682ab5f6b30655bb18353cd7965ceb17f980b9384c494282348f9f01c6520ad6b2da82c6a97a30160dec40c8a7b5f34c8f81530c5259b32c440dcfe9f6ece4c168a27889fb4447df833b024e8053e301ce17a644eda295e1ff8b8f08111d8dc998dabaa13d020d16ca9ae99f48059cb43903f6cbc777d926179c979f8b52fbfec3254f15d0a208268a6db74563721205eab2d4d1d4f691a66181e71f282bebfcb55cb799853996782bf0b6b2a58620f45c907d65991915cc7df899c875b581ac556955d3e759c71094b5dde0d81322c3d08cc83160982587c0083971a472cbdbc1df2468148b87012f31636cf0f2bc8127ac9e78b73eab0e32c7821d45f949b4070fbf586ff09db2e152aedb67c134b3d76c5e41b9f9389829fa73ab0b50902c73324494f9d2438dc2b6cddb5cacf4c81bc545cb36b3331437352efa3ca67453985f4911f6df44d1cc89735a97399709bd700d63b8c80b7dbd76bf8c31133f93afb92086c902af3469134b3b8c435ff81db95ae9ba4c1da852f32db8308d6d082a0fe804154ceae5c2bc7b72191bba33b4b2f4e55e42812ea177b51ae84be360933de5e26e5977c90b49d600f129abd51c35bc7c9b289cf16c74365eb4147ad61fe844104cb5f658175b6daae79b35efdfdd12e1e4f7db85d64b40711f42825839e04381c4f50c7051a85a83c306cc9c02ba6438f84527d92435658c0ba9bb905ed1dcaa823292b16b2931895c1eb1d0fbd6ba499bd5c357ae08cff025f0a164a2852cedcfe0c3c8df15e260880d02286292292cde611fb448dba4779bcfc38beb44586df58cd6730075de0c262c9e0335a32739d8a5fd865423346a9afb59ff347366c0690d8324b2fa4d56e91c2b391468f16dd00c84e3c40814128d961a12d3a07f0364eb622a9492bcd56e23d9fd897d1c3b5ec9782ef392a6715ffedc23d52d3cef29a6220469a4c5366dcb4db2783981d384033a77549a51e71d7ef244afd7d7fa7fa83e678c55147f6350c9b4d915b30b8825db0df5aefaf8fce299f8152ef3e284ed1e65f28d91a3e331476c0a0db21877559c6df239c783aeae0282f8ba53e9718fbd53cadae80a132b9d1820db3675c398fe0faa05f1a73eddca073950aaa2a363e6580c8be8a70448b372f06ab78d86f56883d1188786d253e9c30786fa3db766634fe6ab4895695750ea3889bc10aba09a083b829223066fe0a612f4fb962a7557dfd902fe9b2bcfaf306c92b520b9a2a6ac1f26a559a779489e6b59fdeb3f1399479991e470bf825f35d7196bb5b697ff9a5fc28df97be376725dd38f121aa29a45b866ec3dabf6079993e391f4b73523df7b2931f649ad5ffc6b98bf4bd53338a38aa0d5de2b7d7710fd0ac191469c50905aba0e440cd158f4c4c21ac957730b9eca70211413b7164eab0a135125061bbfdca8a779eec792daaaf0f02171ef1fa7b6c839b8ac5a831fb8b536ee120d8129c801389c1f8e01bd0064ec822bbaf0166b17afd94273cdaae54b328e997fe8bca34cfc07e986a0ed5334ec7b829265ba2b2c9c4a8c9ff0eb7d6bbef383df3f87854b38543f25e8afbb14333f433e5206316c0cef41b73fdc7ccd3e976ceecc05e7a8f3248bcd3351b5998084017d6b85c201862e66a9a2aa319485db4d5fc8e1233e09803f820e4a7a308660428c0bff0f3eceb3251ae6ab15850d68b71729ef68ecd0873804f63c0dfaa4fb023b59d6dac87f1a1374e674645d0590575a16fcac9fb36374458f4bb07c0d257ca9c7e523178f7d67e6cfe272e1fd7892d0a2fe3070e28112efdaeb7ce7f93df8470b8464a2de15453b790a142bc37424ab67744108b057379f9e33f790b0b59750740e7fdc809cece943dbd2b36f75a807c7e6c5660fabbcdb6ce3d8d82eb77cb8e4db4934efdf3931f2abfb064c63d11f0057f3f2af4bf98f22e9a6d0552f8341330a626d564c7fdd3d088af28af7d7414efc0b23134acd0cbf792c276fe2fa5246d991cf4ff76d3f4023bc6c26077a6a003c9e4a8758824f6da9312bd23d41b1aeae8d6cd472d8906d46d437413201dc954682a262d42306c0f9a0111b37dd0ff603f26787fc56e73463cfc21a5d9da9e878fc7f2126945c1251cd614945a3f0a2b08d910f72e6d47b67641c32c4bd7c4427a8b1100b60de592cb501f3181b2d155a641dad8d781a896ece0ddcb1721b2786ad959827c2a438e5a3d47698a85d4ef21517e6dbd4aeaf9c3db822f652e8e1cfc88e218d6e45dd079eed7dc7e8b3a59256e67a2263d22a17edec2a53bd9778c184f0aedea7cc0c9d9beb27bd53f1c7b6202dab5ca57dafda9eddbf673d056bfb0b9b0975da819a3e6c7675b5b1c857b914bafc55be9bb6a4c55fb60961e30eea258dd7397e0e2c9358a8e8a99adf242c693a9414f7723beb15f01f561c803834fac6c01398c03f285b0776847053e2c7b38e91a38c63e23dc6dfa88826aa14deabe58b13c98a38eafc50471cdb082faa7a82ae88d0360743e6523c97a56cd2c5ef96114ff5f41ff597eb7d7451c87b536577643625478a6fb1c369ab2f441c7e4634a5e5926e5796687208deedcbf2014e2db0ab9ba9199c42a964cef2bf59fb91c87b5b2163fa5f194bde9ea019cd04e7570c89743d274fe99b660f978ab1d60239688d123dbea7fee729229bc81cdc636206f31a20d720c85f5f4c69bb6509bed184e2fc44b0a66b4e9356b7b213ead88c38f65f1d5d6df2dceb1dbc79ae1d1f2366b8312a7e8f7cf31632c146bf571e156d116a71b92799a50cb9c89a37181f18858ea31a5be2bc6b20a2974f8a9ba1501240f1d6c8ca1be5ff4ec5be50eeeac7d85fb04bdc0f6436c1a2da6c83a5aefbddf8520aaef4572257c186dc45cdf501db30d83ee0386fb9907d48541a6032c309eadf623af32cd81d7e51e60ffdf6c74b883ce6402a80cdfa47ba26470ee5ce30fccdc7d1265883d0a687d544ee8170544507aefae6fd8cee08be946fe78ca13b61309cca5f7c4b0f9c1be44175b6f7636c67ce6add51dcb3813cade416f4afc7e0a89bac8cb5db999b3ec24ec972fc8ac99852057af43ff708a9b8ad7b20a5ad5891abe0ee5e8d45e53e9882db79fa19a63b3c25fb5b6fa4d4d0610c05049a46c98b5c426c7ba747d3c939074348cdf314de760e5512c0625fab90515846ca752b0b52f4fabf7bd25da8024b9636abc6edc28c143540909ab1171d7864a8e71c97fa67efa16e1b3f2285e957a83386355b077f9d069d3fcbf2a1aa08ae088a16d2a31429f5298f0fadfe81881426f2d7a2aa1f8b96fba35c8ed234adc28c886bd8eb1f240609295621f1cf04f3f471e1fa8606b1cd76a09facaeb780be712ff9247c0ef2e03939239374915a5f7e9ef031554f91624af9bf60659638a6ec1a2d89b4f13d1ca0bb87e3c6592c2b4a9995594eff3214ffbdb9866730c39df722a82572b1ef4823590deac702b33f439c00cebc8b0bf93a3d2ce5ff0c9d693385838ee4638c0e97c17e3b5f82380e3f6c27580749034153a5cae29be5166ba54fc00e35b597d7b4720dcc1b10990f29caac7170bcf9604853d28a10bbed23226ea1250b1ffa06122cad572bc63a97880ea04ec179f76c95844d0068444175bda1979fcdc1a637aba9f9948cd9c327c78e18b9ecfff6e6604932a6fd891c29653933c87873e9a67bfaf1224d2222988a64e71c24c72f893ccacc308e7574b2efd16a330434fb08f0ce612588f48475c04c60d1625c47629ac9b76be88ff18c2287", 0xf80}, {&(0x7f0000001780)="50ab58ed8e3911239397671d3c15dc61311b5575b6017eb837cc3e31ce", 0x1d}, {&(0x7f0000002a80)="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", 0x1000}, {&(0x7f00000017c0)="b4d3357d5626f93866a787783ca3b3b112e74d309f2ef971a4aa840c4c65251b2822e3cb78a8b80d7092f62a8a001019036fc1ae240f15ebf3054bb8d235cc206446e32882b646d4e266888eea91cec6ae32efa387ad79c521c497f054fce63ef0e98b68172f989f8f562620a19a25235c7ce859da9947fec18605122da51959ee5f34a25322a7c9584d4a446612da87e953ed77d7de4cbca277922bb03f7f", 0x9f}, {&(0x7f0000003a80)="1f108f885052d7bc1a395e1ac4c69537447c10bc573474465d166a327f28d0786a549c7b5ccc2df3db6d472ffef6fa87776cbfc2e10ac622bcd72670a029a485fa7b2dcbd6031f3d55da4e80da9f4519c2878814a6a11f6ee5b98d47e51cf1c9656a6c151028e266a25e93ae6b0bc6a2007c9d92622dc604b669a51ff5fc5091c9e767b23c2875f93197ebb8b6dc4bf897c61a7aa08fb319fcdc6914a0f44c55425e74602ce5b65a45330dbf4ce09d50ffe676f71d6a65772c7e06b4f7db2864f9fd5062aefffc455a7e56f080c0c6fd76fd43e536119f7f5714dada924a405a4cde94e7da1b070473e7c9c921ec3d21a9e8aabe44edb2660903ba7ee1c76a9b977fed2e99cbbf32f7cbc7ea0fa924226837f04259e0d00457c388b9d6c25db0b13ee00b659aebf092008323d6dc85e1c37f49ed4d2c2799ffbc8aa711c17befd19394e481fcf4a732f9288787d2ac3ac019ac53dd1965c409f2eb59192aeb402ee8e120172fe389df2af94570effad7d85c66eb14e31497b2fef7b5cf68e46bcd4abf884144d2fe41516144560939fcfd57a9028ed03d5854bb9b1a6638a5abc114ae1188a519cbc2c2297b70d450d482d4ead033dddd51b275abb25f01b3d2ce560c6f2f8311ecef6822ba6509c37694982b49d353a98152a6e37c0ba8e3a9c9efa5fcf2a6a495a9e115eaf395ba010971eda9d3ce2153bd461d95e98532204a2b9ff09227533bf5f49588448ffa5a3e1e2d66f3bb9056224bc7ad28ff93af8a806689e2e936f624f95eaedd333e45098cd827092721f002c0a69c7cc43cba8416a1f0b7a67972dd66ce652ffa146966a971e0a0247387d2e338a8c9cb89cb4a50a2fca5b4d67ffd670daf1faf6130bc3ea538548b76409f4a5c786e4068652c74d7c2b842d6ef05fa2df5acc9ef5bd88d0da19207678fd568c2026dfb8e34772a228005ad0e9232a33b75b9ac5168324a2854b2a813ff8550090f97619eb53eeeeafaf816447fb0452416bd25a3b34f6ce96f9df688c755958817b6b59a8d5efb4a6871494cdb183d5e9a5857a07a6fe369468ca6bfa07213f6b5df40eafc5f7dd11a8e89286786ca05697687d63207c023bd5af79e80b9fba88c646cf4f3578e80dc66ef01ead5793c476eeffd0aacce669d9b81688e0bffd3f0f81d8d8b249d74b243112c95d7cc8ac789bae6e5a32ed5e6de690d837597e4b02c9a95ace953d70aab60566b5299cd4852eeeef2033a93fbdd76b82d438620e3727d5f136e9c4a0ad33f7b0941236d3254f4222be4756225efe0dbd5ac8fa23eb727b8c1ef6c718f9e87af9a88fef049d419354f4e237dff996a7117851efc55a0a4ed8051146a40849632f2297e9579fe91397611a5dafede0daef67da8faf37fa29071fe0ef42ab470f4ca18b7d9df20f0b298e407fed939aea1a196b358c5d3fe02628f1ef5f2eca57282629c8e67892f156cd14a4d05f76cdbdadc327d646a2959a489133053416ce48ee8dbb60e9527e3888b83d8542f0f715390b8f548f05198c6f952ca59443f17127020eac786b31e97fc124648806464e9dbf462734cbcdb3011431f680d31a502780b20283f27f5d4ca17bacac63bb778b71a47f548e69d78726ac375e5146ddd26a134fd17b1c268a047c45332f5307ecae7c0e9f791aea642856619cc6852b93c7af5d239cc911f6a604c12b3120e817dc1a7ba155ee57f9ff02023b36fea6f7e92cd1c0402d4a9bef64dbfcbfad7d23d86f604ba67f765ebe9689240b4fcb3f0ab9ea6bd6ffd68fe0caf86321bffca32dab947daae242ac3068704864741d444d2291171246635adb773a89affa4f7d36bab25c928e5545bbb44461c3beb8b1f00483b8a0edda9107383cd49c9333a2471f26cc430b44184d6eb499d7cea8991ef524e9f91cc08aa629956ff04e08a2566d6ca0871b07e14ce2cd5d1a8cbebb4e15ed8fb22efe2f135007a60abb15efe21978595331a4d624bf320bac7268cf2f361b5e445f04a47d9075ef74ea278ddfa912d1aa53ce70615fa07645e8a084a54af49a4dd7752d5186b4483d9ecc751202a226dcf787b73416bf872097d611b4a09faa80350e8b933ecfd996c9d2df59f76409963154346090021ff470418f5aab84bf9dd92dbdb4d0e57721c8aa84393ea55ce7630ecd5709c4d0de1b588c922248e600ffd734d4005216ff75ec7f24127c9b65ea5b74917f8f73eccf2ce7569e5aab7029ef6f936ba2253ca3269331af4c8dd1b7fdcb7049d373e3e944cf2fd51135c76c9984983af24f83e1d813de9b4254ca2f45b269f5485fb71874227b4ce60f91dde82c862d42341ad83a71d3146c80154c778f6218842e6453a9a39b42f2dac79bca6d03a9f22302b1ab744e73b51077d0ce99c11324c9e0e611399c8c117e0393c38f94c5d7b6bc94766fdacc8fb057f0d8895f480787628dc64d371496a4962a342922d0b31342a82347b624051e0457cc3537da8d112064ac3cf299d8df15cccb68b0b5c33162fc6ce00b594afdca884d5604167dac0c5d5c6233865242160959a4d21824f5f1c63334971dc3aec458e9d636e64b9915967dd59bf5d2bcb8b0863ad96d7c3f2159e2f546c6da011ae678adf61c8fad7507e2315d1c1b137db847ee8678bd0533d08c627ab442bc281a08c9fd187356c3912625367fb264ab2d7a1139947ef85a0685aaed2da9788df71393e0da8f05f2d38a3a8666cd0d7dffed8eb79efd10b1a805e0c2c21f45e61ba407cbc843d9e1bb4aba69735dbe3d385b64c366731507e9987796f92c98891b7510625222f2437b4fb475b85c31ef462ffbd956fe1242886da866af7de9e63af068e854ec5f85ab67428dd182597d090c39c5bdc9f20b47f28bd6057b8332d43d2cc8512c191a0371122afff388d54fa59edcb86eab3ac8d26e64e5ad2f399db08dbb819f559dd7d7f7d526b853d3d2e48d0506cfd262e875d7dd000f78fe1cf4f6daeb7d60bf62e94da0db7667da48942d7eeb83b1661f9c1b6ff278f2867c859ee85b598b209c5d2e94c3aa53abff4eecda4f2f62dcb0005a37a31b185ef6a20b80b9186bb786edec3947d919927d56b70f830fcbb91976cbd9c2e49ec56bbb5dc89b02d0f9f67725c5d407e6a27fa03c32ce17c7cbc9cf2955bbd827dd72fab56a0bb63a3d7c0c03b47cf8ce6661380b3da4964dca7dfd22d8e248618e66d582046d855265ec3c08fb598a3575b097f412da87ef01211fb5c642f1fa2a3ba2dd5cea77aae81c718f07f7837f16f663d1f29007e8bd90634bdebab04b79adc8f4e6e43fd139011609830b9a33497dc6d36e7ea4e1fdb12f9e1bea44ccaba0081c579227e0471f256871a5ef1535b985a5bc9e2ce05d1c52f496ebd940f0179ea843fc87900ec271cf91c2348f0bd02157a70d415b5153c0e43c68626eac95d585d315e845095a95ac501a6fd3d8d5318b68fcf839c5aa8c34a30348f4000b1b5cc38f3074c39b4ac3e7e4e662570d4a41d685a036b18668f1da18902ff0bb399d44b624db68f1ef05990810735547842459d9041030b316f9215de576b58a0528d5ccba891154a87389a5ffb6516be59d11017e370a6bdd0edb0aaf605129b863cc56b4699a5beb892913f12f3275a06633c00f7f847084187834800c9a9c06c62415924b63fd54e9042aecaf91a999a25bd506826996a97ca8f0e5807e49e6af384ace2a8d5503ad7f9e33c1d5b7d9cdca11942338399b0b7ded2911e972e64e06d8b736e3de2e7df48a64ae8095b67b50a297c258d120e6b54ee17e2cbc6ddce94652ef23395ba61af4bc46419112da9c92f84b3d8f2262bc5f836de0dddc0c76e65db7acaee82d10297b133ca4288a385740a6845fb6bac650e76ceedc9c329d3010c0c31eb50db5847c3c2f4fa813ec7429019b794c26b8a4207f79f74314ed6244cb972eaf40310a7787f41c4104abd5987392981072367e34b5120cc9be3823e2783d7191a2e2d2e151dff165fb21d42e703369753134f14bce922d3b0a71fa0a3ceb907438957102f67dd297447aca535cb951202dcb4c9c6b06672bae0fd1376c7ea5af94d623366b31064df989b039df5bad0ac9e061985e0d788526b841cc7c3fb9c8a2f2f16c40084d44d8ee0ec164d7572a0d38a4d5ee5c599a9d6f9083c0c37eeab3e24f823afbf39fcc4b8e3840a052d767806fc167e649ad7a6cb4734f5a52f794089b64c917767388aa93c6bad3ffa38f08e97a6b3adb4c6c86cfe75f69062f587d0aefe33d0024433fee8b62249402e16627e328d1f4d57b29c4c9225c21259c312877f954bb82bc01e5ac0a661363525379fe77830f691493ec4a5c1eed5bf8671ce09bb26c5e9033d86a940ea6637bcb7302e20d199ebab156bf9772127f0e4955749106264184e3760a4af00289a5868af7b88072fb7d11354374b161c4b9c3baf2fdd6ec043cbf8e1831d84ba48aaf75838794e97a0a503e29c42b472633edd190cad3adeeb8f6b7b140fcc3d230d7830df6ec1f1378fe705a35622c403e3815447787f60bf6726612ed677cfb83a4d7cff084d292c81719a8b5a5a3f04705b421971fc017779c00e7ab78e56e757131ad5e3c0dc48a6151daba99027d98197d97fb00e1569d1f1e92403099fcd4976e790cafaaed0d9992cdbeab703a1de6227e34b9f4cf620e221ff6b18e83d1ebb48668c720b7f9926f9d58b95e40737bde9d3b1bab99a16bd482debbc59822595e89cf685e9eebc054993da2b3b428f037bf2231b52d7b2eda585b10be3937b269c4ee98593b3ef7283191699f52babffe02ebc4c187a742a9a8e60cd1e40b380860150a90aa3c60920655b379fe976d90c76378fae4abee8ebe5d3da0885b3529a032e80eb850a2f0e4acd170fc67b1ea897bc983639e3341dd1386825a0b7ad4805aeea3a41bd7b9d281931711d1b6db42f106c2dc2c7840e90452b07dd0a8ae122f1f94f6cfb9588d276531986166ed81b5ab80d6a29932c6a201c30fa63cef5be454ab7eb63d92ef55cf1b4def2419a974f03f77389bc1e36e0172e7ca7da79a647e576f3c2681616a59b9129c6d507daddf4ab9629d692a61485cdd495ce649c806581810615333fbe4db1e152d3941b6cf8c91deca5bb6bdc1a5a52a50e35081170720574ff80cb47c365a7a502a6319aa1b054d14a322a7b4dce1a634ae7585eb3de61b839d05b7c368da4b28189422815930ee04cb36150c26e5ca0a6082d48d17a595f2ae26307fbcbec1b0a9caa6593993abd6ad4bd4af5b2682f2a99309fec4f074c386c68e755b4c2dc67dc25746e2e053a9fffbbadd47a1b1474a62d7ea70dd3c6a9215144b88e46bb24968e5ccfe5dfd877a9979eb37727fe464d47dc4bf09c512e36828de41f147cb8156e3da5091f11c408056d2ba9ef2c6e41a2e4793078e424487891201b9ed8eaf4eaa3495df0b4d0e3cea5fb82e93de0aaeb9ab93c51ac46813c363c5e4e6c6e4e14aa95cf5273ef3a36495e1bfa583a645e161bc9a3b71981a522e0bc38b4ccf181a75e6793e795feebe330018362ed6933a4a6214a7aca1fbdbf605406d74c1d9813184df51f0166bb17d6b8b23a9a1d80c711044f132adf8d8d8b04fd601b982b489ba82d4704af936eea8e4613b8598530f84789ac4084ea5740215d681058567db766c432e7c6cc350696674263682ccf7e12f50f5a045af24dbdf0f521ebdebd2df1cbbbb18ff52b4d3e42995527c50f4855ef0fe6c176afae7af245a6de0adf1384d4d16e006eebb285d6c1c4bdc45978e6c6", 0x1000}, {&(0x7f0000001880)}], 0x6, &(0x7f0000004a80)=[{0x90, 0x119, 0x723, "98fe2628b90ce5e4f2b558853ca35921bf81985815fc04a3a82466e5d8b1a2586737c21d622d935e6281322ca1e59627fd3c0d3cf2d1b4620d8e525fd54f61bc505d64132e7338671e5129fcfeaca386755ac7586ac747274f3c4b200d7134438c34ead43be89efe9599540a52402509c9b80b86ceb68a78912ff0"}, {0xa0, 0x1bf, 0x0, "42628cf341c2bc551d60a95d96fd4f33af378751f69d1596f0f639594d35008c58a882125ae3a40c6c6117a91ddfd77df62f1bd10c3dd7e8c49f74613e9eea3132887d20659a6a9af6b0fa5d39030e1df91ce501a11e44f94633dfb94abf4869b5c9d28dcf2fd4410d99e680dfa55cd850944575951b5b3e87787cb37b33d06b38688193f734a753c2d1ed697c7e95"}, {0xb8, 0x116, 0x13, "354e07191681c40e05fadfcc519f095f97a80255620164a1e891a249a870a2dba15923509234cee70c4345888a8325c41046ea2dcda54234e6097674b89c65209276fc17cc07034f89b22ab3b3275757f521b2ed8e9a482cc7e3f29d2a608c2c32d1c5e87ccf5851392064bf5a1abc75e5e4064c6da246b2a01d215049e1215d09792f2998cf5764ce56a53183817e3c4d11a6bb3184a0312f53dfcefc4c8dbe7fb976365535"}, {0x58, 0x111, 0x0, "e456de310b964a4a1bd0a4c8698a83662b35f27980fe18ef5bedfd09371d94429e39ee1020a1b7ada407f90a25cb86c14244a20fa864f80386b6aff5b50013ae29db"}, {0xa8, 0x3a, 0x7204437c, "bc59d83109f9c934c0e9357eea592d4b875ece3a28821fb05fe8fa14ded6934dd45526e0b69577016eb963e71169ac5b8b6189c823d2c7fbb49a90c5fed136a76fb3def831bfcb69a09ed9c55370749196269d875713b28607fc9ae212d0b8040fbedf0622a71266d0232d40b14f7bf150fb160dcf99a4ef836a370d1c3d37bf4f37c011bd911138edce589103d13ddd3ec8c6"}, {0xf0, 0x0, 0x4, "00341e13c4199e12e50731a90bff3ba56b07a67554bb7e4ee6656e8ddc636b2ab2613f95b6ad7f4d8f2c69cf4e5938cac0ad6b2ba1ab257b25583a49d737c4a2c7dbc5edc316df4687f7a1815c0a7d578d509b60a21c81cb1a8b5cdf2bd4f1ef177649f848557c9e817529af7f98cecd2260a60c3b0a3a5a0af92f183bd9ffb642f95f282a53af6d43871ac8b2b54bfb7980bf25ef1efd96829136d024be4c97b5f976f0a114eb0ceee7e20ee6e268350833b8401ee46b7b5d52514165b76ae1c9a2f926bb49d9c5dfaf08d339f48a342b3e989cf6ace940934fd9e32b"}, {0x28, 0x29, 0x1f, "7e88f6d0d8da53cedd55e19f81a1331b9b"}, {0x18, 0xff, 0x1, "6700301ce8f430"}, {0xe0, 0x0, 0x1f, "49ba5c8f76ae81bc397e6999d0cd1422c93f0c47692cf6667ff62c6371d769c9d41923fed50e46938bdd9f33aea917c073ca503c9737ade40d3771fdb3db08111e7328d708ee608da1c66341c08ee53ec76cbaaf55214407816833c10c3fe78a3a57db6d414db60d24197cc473cd21e8e626857242699dc6749af61575752786122b9a36553af7ee81848a840247ff5f68bc3309690bbe8b6df11d8d9fd50a51479d8fa0b267455e14feded87802904033238696d6ac8a764d08bf98b360ff843b2940dcba985df936ba21f7a45b3529"}, {0x88, 0x0, 0x2, "31d2993892b20a570e4d8205c07e50a65a5e6b98064ddda09e6bb43859a6ef3ef2c0bdc7f9116809b74dc22854f3858ce723b981ecde5d7e58b8398fabcc9481531c7b7ed8febe2ec87ab2b271d36bbb3b747b49d646f6a637844db0364ddb4a385decc3da12e70fcd031afc44a2d986b85ced"}], 0x580}}, {{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f0000005540)="91b62a151dbb5d664633acf1b6a63a44a22d4a6212c592e5e27260293dd1432bf155523be12730c49cfc62798abc3a9cd4ee458e3e83b5967ead6b3ea1dff441472b114ade9cd383715144551004b8992a78062a6f9150688cb164317f982540400adacf9d12b46230b799bf945225613c1dacaeb735f88b5e0fb689a4c7fe54af753e8f2330ecf697e34a8a1f1f6557a6", 0x91}], 0x1, &(0x7f0000005680)=[{0xb8, 0x111, 0x0, "04721eee1a6bc78830e89c4732d4a851f23bbc1bb77a072904a774574b0a4131fbf0d9e109a244272e07dee1728b4cb4f26fc12e218a56479df35c407f75188fc0be252f6ecdd40fca79a5a7d9f5818de7f072c371c6fa88fe7964bacde70ceb33aa917f85fae89dd5b5798acd3fa4de0e0d80dc5af734b9356f0f2f49225472b7177f12bb06f7d56bfd06eca9e4ddf3c457af3126fc2469dbfa24c834c5a2eabc6ebfe44f44"}, {0x88, 0x84, 0x7, "5786b41ebc0ae3568f8104bc749084832dfe1d7a2aab91491b0b041f94442f7bbc3cdb641f2da40f1d9b1be392c16aec3859eaa8f0ccb1baa1766c6f772ab45f0fa84e63ae5dfc7711cacb6d070074d40b4de474c1c6702eb93c0937b6e9371255a30955bc6749ed5325deb8015d04f6a07b16de1880a6cc"}, {0x100, 0x19b, 0x7ff, "942b6c31a59d69214457ca658bfe3e6a93c7322f77cc367e1563f05ab2e9609b14d93af3d43597f349eb91307ad1bdc58d415cc183f493e4f74761fdc00c96b99dc99c0872f2738512359539239d98b75e7bece261c5d68467f69f027a92d84eecd947cc2744bdec0fce481692905956c0c1663d73ae856f6177d901fcfe6805dbf350ccae7bc2a761c08297fffc59de66c7e1c559cc79481dada60448eabcfbfad6cc70369f2c696fbcc617aa0232e2073fd434db77e5e7cb285606995f26c53d19b02df6133e29090f84e6de87de4af30ff415568c2666cb7a774d9bb703bf40921f56e11f4ba2e510"}, {0x10, 0x107, 0xffffffffffffffff}, {0x10, 0x101, 0xfff}, {0x18, 0x0, 0x4, "6a3055a7"}, {0x10, 0x112, 0x5}], 0x288}}, {{&(0x7f0000005b00)=@caif=@dgm={0x25, 0x6, 0x1ff}, 0x80, &(0x7f0000006c80)=[{&(0x7f0000006b80)}], 0x1, &(0x7f0000006cc0)=[{0x10, 0x1ff, 0x7fff}, {0x18, 0x18e, 0x3, "cf345c9c52cf3ae5"}, {0x68, 0x10a, 0x7e6, "87f7c280bcacd84368cc466aca4051630a5b404d1eb5ce537b978f1a3687b46eed5178b2db6bff04f7dc43b4deaab855e9acfac1299c642e5b504c0babfd94a656f1c6df207ca9b65d237871628a6bfe6963ead579"}, {0x20, 0x119, 0x100000000, "43f0986845c2875b02"}], 0xb0}}, {{&(0x7f0000007d80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x80, &(0x7f0000007f80)=[{&(0x7f0000007e00)}, {&(0x7f0000007f00)="546174f879604ca951bf3994c17d6ab577824b38948463d58611dd84eff3484d574fb98854aad765e929849c4300059ceb28c389a8d0b7301584efb9870b4eb1cf412bc0477a67db279079f24f7fc4edc1970902d573c34661a568a99a5d9de73899c0510e", 0x65}], 0x2}}, {{&(0x7f0000007fc0)=@ethernet={0x307, @random="c04774721887"}, 0x80, &(0x7f00000081c0)=[{&(0x7f0000008040)="14b97db46302afac09df9312232390b971e951dd09526d1492afabafada14d619450f6f14fe1480c94c736bd49bf311cfe3f9cbdf809f048798e02baa819d45d4468f2171037f88a1d89498fee2e19835e3d807e6fce50f63c3e72c7ccfd4ca950db44099d8c59c903b864f75fd61d8ea27c43eab2a780fb5565097edcdbba45791eef20a403d98f34186d19c34ec5702c3bb7a955b715d8765b146dcc6bf73355adff3ab46c2ed0fa9e45e1fda6ab4f34cb530ea086a814b5628f08ea9126747d4ab34bd24425a3a3aa1ad3bbcc", 0xce}], 0x1}}, {{&(0x7f0000008200)=@x25={0x9, @remote={[], 0x0}}, 0x80, &(0x7f0000009500)=[{&(0x7f0000008280)="5dafc768ff983329d3bdb23d3c8a8b02681902ba1a3ca2068e66c8daa3615c1d685fff85759d9e33cb431205e9d18d13c0f2ab595729bbc78feea06563201b21c4436b44d66b82e646f839881c211817a84151669201e38e5b48b6f5950b855503bd4b1729551110617b4d72f97277a3d8be19bc831d0943241feea0d5427f908cbce375d0215ed1ecdb8e1ba89407c8c96be6463992c2557143dee2db6067efbd26aecf9b3b8dd25d088a08ff7c47b345d7ddfa0f", 0xb5}, {&(0x7f0000008340)="97b9e460f98fbc796b3f0d06a119bdd89246a35d7d3a81f0798454cd5e770601592aec75", 0x24}, {&(0x7f0000008440)="9b7e04", 0x3}, {&(0x7f0000008480)="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", 0x1000}, {&(0x7f0000009480)="4e8e10d305bba9145c112b4daed73257b8b91c30134169b9712a87896b617c5434c4ebe8a539b9e0d71620c329a909fa4fd1893d0ad536dd253cafd9b1a477e302154ccdee32783aa5039a08a2df198dc1955aa252f0137069472976e926138f9db2f715774ead792857872e9f", 0x6d}], 0x5, &(0x7f0000009580)=[{0xf0, 0x112, 0x5, "bd125782f108277a40515680b7a80335843f6857e437d88af8f39fed2ff35a8c1d02b05f4eadbdb9434d614ec9dc37dbc294073a323906ebf551856840e670a004e78099c262a35d1cb4e135018ff9149015813b4d26e3d122e4e3997cdf1af4ca485cf736e56eb65b330550c4cf8c254ed6f7c8487ab04fed1eefada3868c649f1b6deb73600c7c311106df94fa32f87c1b3a58b2d0fbeb959c5e94a239989ce63e35dcebc4ab1586a60e34668b64ac5292b45b60744c7c22511e491e7f5fa89a4763f51fea77f496d4ebb32679ab17e84c97f080a9bb83e28afd759b"}, {0x98, 0x114, 0x400, "f2f6afd8ea0a2dc364cb12cfd855f624208c6f36bf42525f1cfcf4760ecdb1d62a5f430298715d55de75a6608c7d33fc5aaa3deca7c19d07fe9a0664bfa73984e7e8e394992122583b09993f703255b851fcdf03e255f5693fdd236c8995b45e598d03f40f5f8f575929d2f39906f89520b40fd2092fd72022c21ecb7839f70a3cf7890013428014"}, {0xa0, 0x8eac83314aefcf9b, 0x9, "b79d5cb063a6377e2af8a36399eff528da236de336562aa231818fa1d8746af925b52f60196f7600667d52ddf6077da5332f85199007f7fec3b665c12707eef6c8833114c31297b3ed1ab8cf54e5e761ba011d785d1234e2db8df660485233c3dcbb12b81fc4cc710842eef84993b690b91faf7d03dd96a8be8ead7ee6a42209f142a37c584bee36744b2d8aba0f0932"}, {0xc10, 0x107, 0x5, "80091d83606869183876969a04b7274bd76f80484828987065e166a0a1063ce67d4c69cedf893bd3a80a8b6a82b2f2bf5300cf08af66732db15b7e4cf16d7ceca79663abc6d55183235b3c4c69b1acc3fbc08038e77634c67a0c645b608b1a030350c3f0fddbe5b8f36ece9e1714eb04de5f1d42ee40385a93d43773f7ad71b164fe8f59eb745d68c0940ee81ed7c4659324edbe8d56a0fab4ae44f02ef0b24e8c6124ffdbea172113497ae3d964ef34a8251c1d5a0d3fbb980f56639a0a5ffc67cb07bc73d49405418e8117787f1f563c9972915a581358d6ed0b353bff2523d83ed98ee5f24b32f2b74c6441137294823ac3048cb357707ca74fceeaff4a97e998a9ac0c2e5351284f49b5afe3d54588f7fdb3584b1b9092e38d7fe69ca7a7f492f263d3459d34915693af9a886393acaad55bc58e6225ded6cdef369581cb144924f0941e9d327003ba9b48e6e48bba596c8d0a09d7eaf481b01ac2101138412ebcdbe32463db87181462f566efd9aa3cd5abd8e1707fd916c70aa8b0535c3634176f3ece441bb0883e77501b1afa47195ce9e7ee696dc750eb6812f0ca5d6b8bba0d729c29a9298ccf67b34dbc2a87846b60f764eb2b63945edd6f90959198a7c7fb08ebc4dc174972fc9a1935579fcb64f7b19baeb77324c4d8421ab0a1e5dd72e7fc537ec88836067aac3b65a376b634e10c8b257ab80c48545b3fd629f94461caf3837cdaa1916a62659eed644fb8ed8f936de8546fa1ac5be992be633ce94050e71c27d7a24a03524b58a4ea95eddc851963ffbce30e5971454246f2412a91797ece7fa5c85a2e18dd6d0acdf99f0334fac7c78dd38b6b3a7b6e846595d7ddcdf5742110608b1bb4d1e95be8a7c17704037c94c8bdedb9b569324c6d26140bb43513b4198a648149bd9a70a75c063cc7d6b1fcf5762ed430e4cd07c190aac523be38718cc8039d5519beb4c61decc4a184a762a4b68ee82ff2cd51bf7b4b74693cdd1cdf99323376f25a9474f0b6eab53c414557b14ebc6aaa0ccb99562f25506b0f036f4b810de2b0067f44c5d39c003e9c4d3376cc26356b5e8af2049ab50fcc23ad39c333ef22b84b747f4e1661bbd8323e14e9f7f4056cc59b543057756063287229e3f0b924db09e8fafcaf7a9ba9fa74fdc5ae803e51707c7d296f7cc2776496f27430739b84b8d6c92c042e1e2dd63ffc4c182919182704f366a34c0f624d19f0dc1c401b1d50b30d5c928a35181104b3f4ee0a02507991507b99244b4aa1b0251f519d543eccc6f918fb70d143983893ef5754b8de3e6685f081f6d1e673e46df931c91d16c958c11bfd37d02d9622660e791e5f652af6f5f5d9c7a7c5e782eabccaf1dd96e2a7fbfc50f64c4aad5df5f6603ddb2646b6cba908252984815cf5e0f0c60d85c50612b3b3180c3ed47dcbbf37e91fd37a63ebd080e00e9c674576bf4633d9832788117670faad74b74e11ce22115eb24edc0c27151269a79c0f565e5bf48e1ea11d3b20944e26fc11dfe64ea7c9fb3f8caaced86f9776ee27c2fc33cb282c7ab713f2335d50884d9ddf4ffebd85cedb5be1d00d8dce22a1a9b0e08eb77b8fb7068c54ac5332df7d4ba28891887829aedcb3f0f69de2715140e8a7fef841565af564273d571f3eae4a5e943479c3e39684bf0723a975efa0c33d01ee1d703125e80c5f24f4b5f099ae01b7f8646b458b9a2eed99f8cb2d444fa783f1292def49c1139eb76cdeca2359af3fd876805a10e34fcd1008042b60ffc6e75a77aafa7697ed12d1e5d0fbda8076d224b420abda8d8697bc78d7d744b06146ce5c8d02de874181d7952165b5ff0bfc05a77526a7d4e7035dead9378b9096e743019803b947c3cdc211cb4fabecf4c1a41ac59f9bea3b736a45e5ba3600812b675b8a7901bed06fa1746fd5133c5a39c95a01938b04a9188ce96d1cabfad6a282eee03d194fda30e66e49a754e0be99d882bce754535bbcab21b49508f07585794aad533396d7b09f71388b6bc53ead557f3693c7d7738d97b91997a3453cd3c4a714479b6d4deb0b52c8a3c5dfc0891a173689592adb72037004173eb29eddd4398089953fa88b80242de33f49029b71fc2c7e69db118e38dbb7286bd47ece9175cabe27d6dc67c980d947c39892b53faf2f8839dc1cdd93c7b7b66fbfed6f04eed13674334fa295f448046d67166fbfecbcf32dd57d365b9e3ce64c38e9c8c6f6850c084ed0e354533724e4e8868c4881dcbf496f126cd6e83a4fd007e2d4b16a284b64a2fcee278352248fb3cb4062507b5ef465aaa1f082830c3d59b3197ffd3484bb141620898797e1d4f90ba5c5934d938cf65c0146f9d8f04364361df5cc11db89718e7b51f947b0a7e7d6c42d4246ecdfdd65b02036e726b32ec272797eacb14adbc9a6ebe742663482943b904976efa37d3e5b78da746a4d75bf4e4095a6ee8fe57e88c535508163e03b30664c632e65492f9e2863957e2428f10194b3528674ce024fe5581a6672c968b34754586143e6deff113f6f790a009a80d3afe05571453c40d249b850657177e6d46f335dd1a321e89a60228d5315ea0899eddc06b4407334a339696040fb78c13e465196f0571ce0eb587f9723aacfe103f27c53563782e452a6e315d047da0789d21503d8eb39b866fe5a97d4f0f99a9df05359e535e7813611e7390c4855b8c1f523dc59a218740a63be22726ae14fa65d9706db4fc41e12114883dd3826db37ba6cacc5c4e5f8c136b37eb028133e20b7bc47abb04c0624900cfb630e678ccc7b1237b6f4f356905904ed610b25172971878f3f7dad25c9c281c94a0c0f97d0fd7cfa41eaa129a97acb5872d865b47a149f96c53df9cf0f60ef014462d54781ca461a5ee75c9a08feefbdacaf9c2d5a5c9cf3ce91d2e952d9e23558ca8ab49809393a7f4db840b0d661f603034f4b2055f9c99c7a2ea10cc74461d756b05c04c56b46e1c5ceac105a62d534bfca09370805796dccbfe661c5a04330b5600e90337ab630721515ac095d53d5beb6def55b098a36278dcfadaf02c8feeb60b9865ae3802e626b422073f73371f5111bae46012b2b29856cc84187a20bf8f62ad1831ce176edbc9a074d61188bc00cd7466005d04ec1b30c7c135a42317c69768f9b16b0ad55523d89a89c49541627e6890100cd4bcd147dde273bd8e76cb0eaab770514869b7ef31ea2b3c52d81290464e1d8066ccf66f322f12a7240489c92f7c0007f732aed1a06f787a23007d44fc62d7c91f5288d47814a65244041ea2d76d04c3f700cec4ac3c6432fab1819cb493ef8c81ffdd57e750157c4d73f33b59883835e12cc195705a2466989c958440f574ce014e414b4042ac1d59f9c72125d8f6948604bccd125d13eaa44ca3633be7189ecfc6db2e75f645ac2c44ca48b4e29b8da2d580f2730cf3c56dde9f3faa6636098c1a2970e7c8ad3382feab74f6200dcf183480a71c447d9aa4ddbd9fa1c4dd67218f8d20e41eb62326065c796a95c63debb887a190bd6aa2f332b160766e2f5fce595d6884e71e1a892a9cee9dbaddd596f63411fe09c49ad43c9bc5747427ee0644aba9105672690fd535c61bfd08e9eca51c82729d66fdb9a5387bd4ab308ac30c03112aa12f3ebb09793a1cbd8643285e97e1da08638c6306558149ffe608bbc1e32b60d458f8e3bbab0e9c8c6393ab3c1277ef84059c99d3df4aec93719489c0c9b29b8f4a48bcb5f10d90f5572aac7717e1db3f4e86d853ccacd6ef98338da32341eaa08069775ce7fcf3df7ab0939b4ad63bdc05b5dc61398c4e047f255555cf91cef753014ac8e45f8bf12a9425e8f4fa769df5f08f7faf3ef58677949be432e6b36658b0960adea6a2e970407e42d0e7e179e3e37f01744bdf1b3e69905485828c80e9fa91a94e49d614a63245e51d8f7fb46a5539ea3c57d2fddd80882f5d00960673f54a53af38dda6424f4ce20e4c1df6780b1510a2ba2c1c5a1dc607d5e443a8419a15704c916586064b60182fdbbbb465b4701d87e1da3cba6b0ff9a665c45dc5f2033e150048ca412e7273b115058c00abc0f64be15cba1cca60a19b44a6f22b39a123acfeb6fcab78d728926a1214097d493a0afd6068ce667d355b80068181928ae706a409eba39f445c67cf8e4ee37b1b08e99c90e35c0ca070e3223651484339cfac9304864a605216eb3ffbe36deb9dd04d355500cf2be27724454d22bb5ffa5690c517ec2b0d9958b14543c7510cfd497e1a8dbb783007497146de37161038495a292e6aa8e14f1157088f705647d920e8e8a00c2e225c7f6605481cf7ed43d56f2277d0ccf5c508d6794"}, {0x50, 0x1, 0x4, "621d6f535fc177b730227ae4d1d5f4b4902a3ea23b6a89add0c3a9d93169439d5981783d00140ed7cec29deb8b52be471c63785220c36edea58189e68fc59c"}], 0xe88}}, {{&(0x7f000000a840)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x100000000, "5f4f30babfbd96112d6650e2efdbae9241ae532c63237d22b03f1cf15c90bd16aae0914d14c3262964c3a98f4f80b0ed194ca09e7a73172710bfd939dbf9bd", 0x3e}, 0x80, &(0x7f000000b9c0)=[{&(0x7f000000a8c0)="13e316d481b3c947e88de42e6fa63e9c7972d63a4666057c2669419ad4d0ccfa128f15d0d2c87161b6fe99aa955ca76617e4e541ae6d399de820afb528227600d7cfd0d9f3349becc5303283369f060439c8ae5c930cd038ab6afff8f99776b07c34f070e3fc928d303b092dac28be42847d9674a6dd3279f934", 0x7a}, {&(0x7f000000a940)="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", 0x600}, {0x0}, {&(0x7f000000b980)="4080dda392ce4a4ea49489c02f02f58dcf2cf1", 0x13}], 0x4, &(0x7f000000ba00)=[{0xc0, 0x0, 0x7f, "46c71e179f4bc3a8bfd131e031f4324d8f7d590f304c99812b0bc72ff3fc918668645d9842c0f3022984b383444dd4878441cd55931a4d4c95a3c98e9c849ed309c84e48fdfb5377f06b26e6ef274eae9b992329fd643c6a85e05a0a55ed9fd3719614f280f942ce13994658008d72fbb022a22e13992fbc178c0b919a378826ce12ecaa7e273ad79faede2048350ecff08b0a7067c6af065f6939ea78052f60f707dd494a3c406c32fed15ab3"}, {0xc0, 0x111, 0x9, "25f802181eca23cfbcb87bb23da46aabaed4ed42419e9732419a5f594b0620764b57b2e621fec40b4d7fa7bcd594f2e2ef6793cb32d41464950eae80aed9abf5c0652f1c6df954b1cd81c6034ed8b674fffdd307ba4d17ddfe09d790034604dd98b6d2b9158f0bce84e9c8284e473e2b626178896ebe2cc22770e882418b809587eb0ee88ee1be6b1745be02af52c1ebe59d2e29a94ec6bb212d66641468f6492b8143933d8b2a14fa29a9"}, {0x20, 0x11, 0x80000001, "31e14352ce0d4b2479"}, {0x98, 0x11f, 0x8250, "5564d2dd5b63d85086951a9f8c37e8904f49d3da5bdc1093c3bfdc2fafacac1a58e6fc1247478c1b09a4b1058b4cf2274b46da56298c9cd9396ecdfbe5ce4865dcd6a892640f77d9b87ded630f17365a19f92306cc1c0326e656138702ffd937111bed941daa84be2bc3794a19f01f481acd6256b74dcc90c2e3c304b0cdf7a0ac"}, {0x10, 0x0, 0x4}, {0x110, 0x101, 0x9, "cd1b06c1919fdae39c884dfbdb9ce095148a5ff1e76843c9ec3545eba5276b8a4aefd509f8196b3bdbebf3b1f0c67b4eb20639a04a0666994d0a7bc6090dc386595d5246ec28153faa2808c043967ad6d6791c98aeaf9e780e21af2b3af5ef12a61d0510a697cc3f04e383ceb7f867f746407a948038ff094f805419d35db4734f9bc3beffae72f030a09d8a153ca8825d38417495d049b9e5e094a7d3d9e61176a797033290d4a7ff58f9165ad0484db3b5a86ced167804933e5da25a7d87214b7ff2d61280b5472acbb70a2e232c9b4ed4ad8e92e4647e68002af1eb894d1c9f3a1f0754479bbd28b5580f7f39f2809129da5b3e096c4e2cbe85d5d5a6a3"}, {0x30, 0x10f, 0x20, "e35578cc63591aef60650b874296329e9dcd6a96dfc3c4c5c3a6a23dbcda0644"}], 0x388}}, {{0x0, 0x0, &(0x7f000000c3c0)=[{&(0x7f000000bec0)="5d4dae25681420770e98107981a999204252a2dc8361778e3e7b491e3b55f3414114adefe8d92c199d0506480136fe34ac64e8422ac9d9e13efa67d17d5195821456aa8d0eac17921e76a49397b690205566bfbcc063814e1aed7679fde4d8f342bb9bac589fd75940155867b260ec8dd3fe84e933", 0x75}, {&(0x7f000000bf80)="527593448e0cff8a234981b4a49aa822ae2f15b93539975486e9ca90474538bdb391dc27e650da0eb0b3f77951153e901ab272eccb0ffe3c8ff8227b1b4f5f30b799f577b7b3c934fc7bec07d5bbfdb63426bdde845691b81edf94524dd6b34e9fd41fd3f69b949c67", 0x69}, {0x0}, {0x0}, {&(0x7f000000c2c0)="3aac561d5ff825fce1f5d222919d95e6b8fa0af9059a12874f7eb924e78e2c82e55cdf9e22df8615dc22a02345b9c9dc82989927178c0aeae74031386e21d83f28efc82dab98d3d09c2e01a3dc289e3401b9d6fa2f9f109d87485360126bc720c056ccb70c1438ed7dd773aa4009368fbd8fb43be3ab6483dd19259aff46120969492cdf922398c3de3f935ab37e034dc5c57429ca9fb3b7c688712a81a67401bd", 0xa1}], 0x5}}], 0x9, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) execve(0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x141000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001500)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) 12:39:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:14 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) fdatasync(r0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) read$eventfd(r3, &(0x7f00000003c0), 0x8) fallocate(r1, 0x800000000000002, 0x6, 0x2) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r5) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f00000002c0)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f0000000640)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:lvm_control_t:s0\x00', 0x23, 0x0) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r6, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x3000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x34, r8, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xffffffff}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x20044001) ftruncate(r4, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) sendmsg$IPVS_CMD_SET_INFO(r6, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x9c, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) write$eventfd(r6, 0x0, 0x419) 12:39:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbdaaf21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000180)=@nfc, &(0x7f0000000080)=0x80) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001480)=ANY=[], 0xded, 0x0, &(0x7f0000000600)="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"}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r3 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r3}, {0x1, 0xfffffffffffffff8, 0x7, 0xf33a, 0x6, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9, 0x2}, 0x0, 0x6e6bbf, 0x2, 0x1, 0x1}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x7bc, 0xb5}}, 0xe8) sched_rr_get_interval(0x0, &(0x7f0000000040)) write$smack_current(0xffffffffffffffff, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/61) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$sock_int(r1, 0x1, 0x28, &(0x7f0000000000), &(0x7f00000002c0)=0x4) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r7 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@tipc, &(0x7f0000000140)=0x80) accept4(r7, &(0x7f0000000280)=@x25={0x9, @remote}, &(0x7f0000000300)=0x80, 0x0) 12:39:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCCBRK(r0, 0x5428) getsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000100)=""/70, &(0x7f0000000180)=0x46) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x02\x00'}) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000200)=ANY=[@ANYBLOB="e00000027f0000010000000001000000ac1414aa89202b31d6a96cbe666d9764dfb6fe8252c49ca72cf45202186fb8998a75ab98dabd7067f7d1d34b20df1c62ea75b5570269e6f8fc48d2ed8b298b7eb02f64c99b4594dab51c56057faa8a27128ade7080d99bfd37309bbdacd11653a3f78a67c537b28f4ed549cb5f47ac49723578dca4b3b12f39da3a07cd7caa544b384343816dd63f8d829b2508154bcd1b742d206c83ea0e288ede221b"], 0x14) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000001c0)) 12:39:14 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x424500, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000300)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000160000000703000000feffff7a0af3fff8ffffff79a4f0ff00000000b7060000ffffffff01f8ffff0000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000f80c7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e7790700063467450942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a3497d4c4d81af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c109acd196f03dff2c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41f00, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000280)={0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="10630840000000000e0000004e1228d277bbd625454fc6931eab3efcc8222ebeb729da33b8cc448a33fd13c60fa8a103f0d01bbf45e214f607a48ab2956f59"], 0x30, 0x0, &(0x7f0000000140)="edca312853e3c06fc08376f06b4bdba4e809614a8928c8038d9902f35a7d347d1828d31c5430afb4d5eedaa678db9ce2"}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:39:15 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x42, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) setgid(r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000280)={0x14, 0x49, 0x2, {0x1c, 0x3, 0x2}}, 0x14) 12:39:15 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='eql\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='sit0\x00', 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3fc) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0xfff6) 12:39:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000000)="a200005c", 0x4) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) write$P9_RSETATTR(r2, &(0x7f0000000080)={0x7, 0x1b, 0x2}, 0x7) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000100), 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0xfffffffffffff801) sendfile(r0, r3, 0x0, 0x800000000024) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000540)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000640)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@rand_addr="894405284a8bae941e87ef3ddb8a7be6", @in=@multicast1, 0x4e21, 0x7, 0x4e24, 0x0, 0xa, 0x20, 0x80, 0x33, r4, r5}, {0x3, 0x6, 0x2, 0x9, 0x8, 0x5, 0x7fffffff, 0x61f}, {0x8, 0xfff, 0x1, 0x8}, 0x0, 0x0, 0x2, 0x1, 0x2, 0x1}, {{@in=@broadcast, 0x4d2, 0x7f}, 0xa, @in6=@local, 0x3505, 0x3, 0x3, 0x9, 0x5, 0x2, 0x100000000}}, 0xe8) 12:39:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f00000000c0)=[{r0, 0x90}], 0x1, &(0x7f0000000100), &(0x7f0000000140)={0x10000000000000}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0xffffffffffffff66, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0xffffffffffffff3b) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) socketpair(0x0, 0x6, 0xfaea, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) 12:39:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:15 executing program 1: io_submit(0x0, 0x20000000000000de, &(0x7f0000001700)=[0x0]) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x400c000}, 0x4000000) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffffb, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000280)=""/136) r3 = dup(r0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000200)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) uname(&(0x7f0000000340)) 12:39:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000008001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='hybla\x00', 0x138) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x148b96d1b561627d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000100)=0x10) r2 = socket$netlink(0x10, 0x3, 0x0) prctl$PR_GET_SECCOMP(0x15) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000001c0)={0x80, 0x0, 0x0, 0x3f, 0x101}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x4000, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 12:39:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x802) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) seccomp(0x0, 0x1, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[{0x80000000, 0x8, 0x4, 0x8}, {0xbb06, 0x0, 0x40, 0x9}, {0x5, 0x10001, 0x1, 0x9}, {0x0, 0x5, 0x80000000, 0x7}, {0x4699df10000000, 0x75, 0x3, 0x29}, {0x1, 0xff, 0x2, 0x7}, {0x8, 0xfff, 0x7fff, 0x9}, {0x8, 0x2, 0x7, 0x7}]}) 12:39:15 executing program 1: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x6) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000700)=0x974, 0x4) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000000140)=[{r2}], 0x1, 0xffffffffffbffff8) r3 = dup2(r1, r2) fcntl$setown(r2, 0x8, r0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() r6 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000080)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000340)=0xc) fstat(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@remote}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000600)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000740)=0xe8) getgroups(0x3, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000900)=0x0, &(0x7f0000000940), &(0x7f0000000980)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0, 0x0}, &(0x7f0000000a00)=0xc) getresgid(&(0x7f0000000a40)=0x0, &(0x7f0000000a80), &(0x7f0000000ac0)) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000b00)={{}, {}, [{0x2, 0x5, r4}, {0x2, 0x4, r5}, {0x2, 0x2, r6}, {0x2, 0x3, r7}, {0x2, 0x4, r8}, {0x2, 0x1, r9}, {0x2, 0x2, r10}, {0x2, 0x1, r11}, {0x2, 0x1, r12}], {0x4, 0x2}, [{0x8, 0x0, r13}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x3, r16}, {0x8, 0x4, r17}, {0x8, 0x2, r18}], {0x10, 0x4}}, 0x9c, 0x0) tkill(r0, 0x16) 12:39:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x400080, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000140)=0x7, 0x4) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000280)="c4cd484e8d6cab9939ed57696bd0b33407b4d973f35f17d841fcd2ff321e4e15437d27289f74bfd659fd94f923f1f548e47803e9062e04a96684869fdf83cbacc8967552f52b1d4493f5621898fa15d6", 0x50) 12:39:15 executing program 0: r0 = getpid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) ioctl$FS_IOC_GETFLAGS(r1, 0xb701, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000100)) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r4, 0x508, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f00000000c0)='syz1\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000140)=@req={0x392, 0x8, 0xffffffff821963af, 0x1}, 0x10) dup(r1) 12:39:15 executing program 1: r0 = socket$packet(0x11, 0x2000100000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0xb1}, {0x80000006}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)={0x80000000}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 12:39:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffbff, 0x1a, 0x19, 0x0, "47cc753b328282a654076b3b8d3c650fc39cb6e20569dc4438c5a576633452d292ff2db79ce5f38552a744021fcf0cfc772e01f79a4cd281441e916d0e9f38c1", "67995e6a782b8eb92a2de34b1e750c2047fc42d8a7ec6231ef8e0bf3372ca879", [0x8, 0x400000000000000]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000280)="0a946333755af9420c006949bab9705e13bc809e86904557c415cf95737b486a6f4946f7e2b4ffd039e6976be61bbda92204452d8ac7e243bcb2a739974aa8307354ade79bc96029411b3982da42b60d3875a1f91b596f98060dc8ddde5a1e60", 0x60, 0xfffffffffffffffe) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) keyctl$setperm(0x5, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000380)={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}, 0x80}, {0xa, 0x4e20, 0xfff, @mcast2, 0x7}, 0x1f79, [0x8, 0x9, 0x6, 0x8000, 0x30985152, 0x3, 0xaa0f]}, 0x5c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x800, 0x40) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000380)={'broute\x00', 0x0, 0x4, 0x97, [], 0x2, &(0x7f0000000100)=[{}, {}], &(0x7f0000000280)=""/151}, &(0x7f0000000140)=0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x10001, 0x0) close(0xffffffffffffffff) lstat(&(0x7f0000001980)='./bus\x00', &(0x7f00000019c0)) r2 = open(0x0, 0x0, 0x10) stat(&(0x7f0000000240)='./bus\x00', 0x0) ftruncate(r2, 0x88001) r3 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev, 0x200000000003}, 0x1c) sendmsg(r3, &(0x7f0000000000)={&(0x7f0000000140)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, 0x0, 0x0, &(0x7f000001ef80)=ANY=[@ANYBLOB="2000000000000000000000000700000044100901000000f70b00000004000000"], 0x20}, 0x0) connect$inet6(r0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000005c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)={0x1f0, r4, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6e8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff4f9f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_MEDIA={0xd4, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3b5393f1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdcee}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x63c97de1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}]}, @TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa41}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x4001}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f00000001c0)={{0x3c, @multicast1, 0x4e22, 0x0, 'rr\x00', 0x21, 0x8, 0x32}, {@loopback, 0x4e22, 0x4, 0xfffffffffffffe00, 0x0, 0x8}}, 0x3) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7fff) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x4ac04e11}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000100)={0x0, @aes256, 0x2, "3bb75c69f1115414"}) 12:39:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffbff, 0x1a, 0x19, 0x0, "47cc753b328282a654076b3b8d3c650fc39cb6e20569dc4438c5a576633452d292ff2db79ce5f38552a744021fcf0cfc772e01f79a4cd281441e916d0e9f38c1", "67995e6a782b8eb92a2de34b1e750c2047fc42d8a7ec6231ef8e0bf3372ca879", [0x8, 0x400000000000000]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = getpgid(0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4c, &(0x7f0000000500)=0x8a9f, 0x4) ptrace$setregset(0x4205, r1, 0x203, &(0x7f0000000100)={&(0x7f00000000c0)="7295839dc907e93ea3ea9b", 0xb}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000380)=""/255) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r2, 0x28, &(0x7f0000000480)}, 0x10) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 12:39:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=""/142) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000780)=0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000900)='cubic\x00', 0x6) 12:39:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe77, 0x10, &(0x7f0000000000)={0x0, 0x4000000, 0x0, 0x7ff}, 0x10}, 0x70) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x6f, &(0x7f00000003c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0xd, &(0x7f00000006c0)=@raw=[@jmp={0x5, 0x5, 0xa, 0x6, 0x4, 0xfffffffffffffff8, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2}, @map={0x18, 0xf, 0x1, 0x0, r2}, @exit, @generic={0x8, 0x2, 0xfffffffffffffffa, 0x9, 0x5}, @alu={0x4, 0x200, 0xf, 0x8, 0xa, 0x6c, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @alu={0x7, 0x4, 0x7, 0x7, 0x0, 0xfffffffffffffffe}, @exit, @exit], &(0x7f0000000400)='GPL\x00', 0x3, 0x8b, &(0x7f0000000900)=""/139, 0x41f00, 0x5, [], 0x0, 0xb, r2, 0x8, &(0x7f0000000740)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x3, 0x3, 0x10001, 0x1}, 0x10}, 0x70) r3 = fcntl$dupfd(r1, 0x406, r0) setrlimit(0x45a36eaeedb13181, &(0x7f0000000300)={0x21e, 0x16}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}}}, &(0x7f0000000540)=0xe8) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x4002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xf, 0x9, &(0x7f00000000c0)=@raw=[@jmp={0x5, 0x63ee, 0xa, 0xe, 0x4, 0x40, 0x11}, @call={0x85, 0x0, 0x0, 0x5a}, @jmp={0x5, 0x2, 0x7, 0x2, 0x6, 0x0, 0x14}, @generic={0xf84, 0x7ff, 0xd8, 0xda, 0x7}, @map={0x18, 0xa, 0x1, 0x0, r3}, @ldst={0x0, 0x0, 0x2, 0xd, 0xb, 0x8c, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffff}], &(0x7f0000000140)='GPL\x00', 0x8, 0x54, &(0x7f0000000280)=""/84, 0x41100, 0x4, [], r4, 0x1f, r5, 0x8, &(0x7f00000005c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x10, 0xff, 0xff}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x589000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000280)={{0x0, 0x4000008000000000, 0x3, 0xffffffffffffffff, 0x7ff}}) 12:39:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000004c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x2cc, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x4022) r1 = dup3(0xffffffffffffffff, r0, 0x80000) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x568, 0x128, 0x218, 0x128, 0x0, 0x3e8, 0x4d0, 0x4d0, 0x4d0, 0x4d0, 0x4d0, 0x6, &(0x7f00000000c0), {[{{@ip={@broadcast, @loopback, 0xff, 0x0, 'bridge_slave_0\x00', 'lo\x00', {0xff}, {}, 0x0, 0x0, 0x20}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@unspec=@rateest={0x68, 'rateest\x00', 0x0, {'eql\x00', 'veth0_to_team\x00', 0x2, 0x1, 0x0, 0xc8f7, 0xfffffffffffffffe, 0x80000000, 0x8, 0x81}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x21, 0x3, 0x3}}}, {{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@inet=@l2tp={0x30, 'l2tp\x00', 0x0, {0x0, 0x5, 0x3, 0x1, 0x1}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x10, 0x8, 0x2}}}, {{@ip={@empty, @rand_addr=0x101, 0xff000000, 0x0, 'team_slave_0\x00', 'dummy0\x00', {0xff}, {}, 0x2, 0x0, 0x40}, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x1a, 0x7, 0xa5f}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x3, 0x101}}}, {{@ip={@loopback, @local, 0x0, 0xff, 'sit0\x00', 'gretap0\x00', {0xff}, {0xff}, 0x19, 0x1, 0x8}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5c8) ioctl$RTC_WIE_OFF(r1, 0x7010) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x80000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x7) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x4200, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000002c0)={'ip6gre0\x00', r1}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x100050, 0x0, 0x0, 0x9b}, {0x80000006}]}, 0x10) 12:39:16 executing program 0: r0 = inotify_init1(0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x20010) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000240)='.\x00', &(0x7f0000000480)='bpf\x00', 0xfffffffffffffffc, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSIG(r1, 0x40045436, 0x35) umount2(&(0x7f0000000200)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2021, 0x0) syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r3 = geteuid() r4 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) setresuid(r3, r4, r5) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000600)=""/208, 0xd0}], 0x1, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) 12:39:16 executing program 3: r0 = creat(&(0x7f0000000200)='./file0\x00', 0xa3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r0, &(0x7f00000002c0)="6b5f48f635c59033c97afbf2c68822ff2a9815e6363860b36433b03f4ee99ce4c0371e127d2fb0d443dda41483754a11777db24a297cec5f39a8d886493c651aa77f82585bc6c58ae8d41fcc23081313c432ca7dba34813c77b19a591b201900725621f81b9e"}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x20, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x9, 0x1c, 0xffffffffffffffff}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000000c0)=""/145, 0x91) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/ip6_tables_targets\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@rand_addr="6b1062a37dbd3b2e324fe3e1b0e2f041", @in6=@mcast2, 0x4e20, 0x6, 0x4e21, 0x3f, 0x2, 0x80, 0xa0, 0x32, r2, r3}, {0x6, 0x6, 0x20, 0x5, 0x4, 0x80, 0xc854, 0x401}, {0x1, 0xec00000000000000, 0x5, 0x6}, 0x4, 0x6e6bc0, 0x1, 0x0, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4d5, 0xff}, 0xa, @in=@broadcast, 0x0, 0x3, 0x3, 0x55, 0x0, 0x54, 0x7}}, 0xe8) 12:39:17 executing program 0: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='\x00'}, 0x10) fcntl$addseals(r0, 0x409, 0x6) open(&(0x7f0000000040)='./bus\x00', 0x40, 0x4c) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fadvise64(r1, 0x0, 0x331, 0x1) setuid(0xee01) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) 12:39:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002a0, 0x286, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x5e}, 0x28) 12:39:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x1c19, 0x40) 12:39:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x8000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0x3, 0x4) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000003}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x88, r4, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6a9}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x8}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000}, 0x48800) close(r1) 12:39:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$packet(0x11, 0x2, 0x300) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x3ff, 0x8, 0x4, 0x1f}, {0xffff, 0x1b28, 0x5, 0x2}, {0x1, 0x7, 0x14, 0x6}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:39:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) recvmsg(r1, &(0x7f0000000380)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000280)=""/132, 0x84}], 0x2}, 0x10000) 12:39:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f00000017c0), 0x1ba, 0x0) 12:39:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000300)={@dev, @dev, 0x0}, &(0x7f0000000380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) sendmsg$nl_xfrm(r1, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4040}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@polexpire={0xf0, 0x1b, 0x8, 0x70bd28, 0x25dfdbfd, {{{@in=@multicast1, @in=@remote, 0x4e24, 0x7ff, 0x4e22, 0x0, 0xa, 0x80, 0xa0, 0x6c, r2, r3}, {0x5, 0x20ea, 0x3, 0x3b5, 0x4, 0x5, 0xafe0, 0x8}, {0x1, 0xc1b, 0x0, 0xffff}, 0x5, 0x6e6bc0, 0x3, 0x1, 0x1, 0x2}, 0x3}, [@replay_esn_val={0x30, 0x17, {0x5, 0x70bd29, 0x70bd25, 0x70bd27, 0x70bd2a, 0x45, [0x805, 0x0, 0x2, 0x8a4, 0x4]}}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4080}, 0x800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:17 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) lseek(r0, 0xfffffffffffffffc, 0x0) 12:39:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x80}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) pwritev(r0, &(0x7f00000008c0)=[{&(0x7f0000000140)}, {&(0x7f0000000280)="cf58df351cfb16ca6584260ac984c6d01a89b8f832c1b19289ce0d98ceea31a6479f906ea9db474ffb57909805d2", 0x2e}, {&(0x7f0000000500)="2dee3879773e309b90916981b8ee511baacd9be1f09bb1b45770ca9595a1834e1009e6a3b19299fefde4d9dc1904332479f264262c8ae004cdd8e9188dbdcb1feb66acf9ae2f33e25d49aa61ec69f107f7ef9560fac87fbfe4631ca7213e2961479b31b64763c7b7ba2c9adfca93bb8ad951483e2f5da526b8f569ed6a86311b2f300933ece59e9b68cf5bcd8a79743e0a2e885251936b0a7e137a", 0x9b}, {&(0x7f00000005c0)="67484c73f00fd93d3bd8d7da3f9746e637cd92de9c126c669601566a83d9a59d8e80ba900ac8ba43d5ce4f32cd9efe27edb8c1b564c61c1ea6d8dc25b3f04ae30a96ba2ae332d4e445ab90b3df1a5db199c0744183bde0d4a7cec4e08f64f965cecf6de680d76e8d5db35a5cb02dd148502614ce972accac3df47783dfe9259f731284a3c09e9892ed0d4065c10f2a3879a1ed28ab7f35c90a859eaf2fa3054a541c13ef84dd1eccb659949982fcda7e86dfd209eb8b4118ca01e2eaad1fdbcdfba3199b469d60caeb9fca127a20d9997d4e2658", 0xd4}, {&(0x7f00000006c0)="4675f63c0ba7dac0b5ab09c8b1bd8eb523c2e1f7a79bfcda901311bafc3879c1666954c07fa4f68259f1737b23834e7c94705dbb15d215f31ae0d447b3d77225ae072682bb6c5ab4b5fc5a37385d3173b726ed83aa9d5b3755d2fe5395c87ad8f0eb380608c460a6b26424d73dac7adab5c2558bd301e63d787a49f998c370518cf70da1a218d08ba4419f610e47371e72a6d428126f42e0f9234a9ca9b0e58a44b7efc9038b4caffcf8592714b87c813a8abc3aabd2f42e546ecbf2bac0bbb563f8", 0xc2}, {&(0x7f00000002c0)="2f45d5fa52035ae65b6c31c853d892377d19d4ac91f4ad81995f256ec70ee92c9f55ead81ab4ce0b8263c972b35a924b6b660e2de9a670b47c3738127e421094a80fc25de78e580dfcc2", 0x4a}, {&(0x7f00000007c0)="73da15e8c1dff4da24fb2dd8e918952790bae0bf29b9a5b0fe7767f6e7a9f449c79d6ae190607460e86211837d16fc5454c1d8bcf4531d7b276f79691ed6ec66c2531c9a", 0x44}, {&(0x7f0000000840)="40d6ac7f778c8e19dedee3ed9708e26871022f5dc8b460778b540762d64fd91bf06f526090fd0d45bf4168051978bba4c1c6bde9a79cad8d64cfe8e0395eb6c271d37dfd20b39db574fc3eabeb15df6f79dedaa6726b296013062196a189749cb5b90e8bdad49a271266e2ee9c1dd7", 0x6f}], 0x8, 0x0) 12:39:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000100)={0x4, 0x8, 0x2, 0x101, 0xb1, 0x6}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x200040000, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x3}, 0x0, 0x0, &(0x7f0000000140)={0x5, 0x7, 0xffffffffffffff7f, 0x6}, &(0x7f0000000280)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7164}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r1, 0x4) 12:39:18 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0xe2a42ad6b54a730d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9983}, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000006c0)=""/214) r1 = openat(0xffffffffffffffff, &(0x7f0000000400)='./bus\x00', 0x400, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000380)=0x8, 0x4) socket$unix(0x1, 0x801, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80100000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCDISCONN(r1, 0x7439) r3 = socket$key(0xf, 0x3, 0x2) ioctl$sock_ifreq(r3, 0x891f, &(0x7f0000000340)={'lapb0\x00', @ifru_names='hsr0\x00'}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/net/pfkey\x00', 0x0, 0x0) r5 = getpgid(0x0) ptrace$setopts(0x4206, r5, 0xff, 0x2) sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)=ANY=[@ANYBLOB="05092cbd70ae00000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) accept4$inet(r2, 0x0, &(0x7f0000000440), 0x80000) setsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000600)={@initdev={0xac, 0x1e, 0x1, 0x0}, @remote}, 0xc) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000400), 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x23a}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 12:39:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) getpeername(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000140)=0x80) sendto$inet(r1, &(0x7f0000000280)="ed8d70f172c2440a99ea9718172d478ac3b1", 0x12, 0x40, &(0x7f00000002c0)={0x2, 0x4e24, @loopback}, 0x10) 12:39:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:18 executing program 1: prctl$PR_SVE_GET_VL(0x33, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000500)={0xf9e7, 0x19, 0x7, 0x3ff, "06abb10643b42ad58582429e0a6aa4d09fb37feadf7bd33f6673b74853aa4c48"}) r4 = getgid() lchown(&(0x7f0000000400)='./file0\x00', r3, r4) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x2, 0x226, 0x3, 0x5, 0x0, 0x1, 0x400, 0xe, 0x1, 0xffffffff, 0x314e40000000000, 0x2, 0xffffffffffff0000, 0xfffffffffffffffd, 0x1, 0x100000001, 0x7fffffff, 0x0, 0x1, 0x7, 0x200, 0x320, 0x0, 0x6, 0x1, 0x3, 0xd27c, 0xdc, 0x67b, 0x1, 0x0, 0x3, 0x80000000, 0x3f, 0x1, 0x3705, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x73a, 0x8, 0xf, 0x101, 0x6, 0x7}, r2, 0xa, r0, 0x1) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000004c0)=0xfffffffffffffffc, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r6 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0x17, 0x4, 0x7, 0x0, r6}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r7, &(0x7f0000000040)}, 0x10) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x2000000, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff000000003200000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x138}}, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000003c0)={0x6, 0x20, 0x4f6771ce, 0x751b, 0x100000000, 0x3}) sendmsg$inet(r0, 0x0, 0x48001) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000340)={@ipv4={[], [], @remote}}, &(0x7f0000000380)=0x14) 12:39:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:18 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000140)={0x41424344, 0x41424344}, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344, 0x41424344}, 0xfffffffffffffff5, 0x1) syz_emit_ethernet(0x111a, &(0x7f0000000280)={@broadcast, @random="d21a118872b6", [], {@ipv6={0x86dd, {0x8, 0x6, "d01f48", 0x10e4, 0x88, 0x2, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[@routing={0x2c, 0xc, 0x0, 0x400, 0x0, [@remote, @loopback, @empty, @remote, @remote, @mcast2]}, @srh={0x6c, 0x4, 0x4, 0x2, 0x7, 0x50, 0x5, [@rand_addr="b024e28151f38b61ba0ed96f4728fd24", @empty]}], @tcp={{0x4e23, 0x4e23, r0, r1, 0x70e3000000, 0x0, 0x15, 0xca, 0x3, 0x0, 0x0, {[@generic={0x22, 0x7, "7f38c5570a"}, @md5sig={0x13, 0x12, "e19700962fffcfc287bce413f4535bd6"}, @timestamp={0x8, 0xa, 0x2f9, 0x2561}, @nop, @sack={0x5, 0x12, [0x0, 0x5, 0x7, 0x80]}, @exp_fastopen={0xfe, 0x8, 0xf989, "6f8822f0"}]}}, {"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"}}}}}}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x7, 0x3, 0x9, 0x5, 0x11, 0x6, 0x7, 0x1, 0x37c, 0x0, 0x5, 0xffffffff00000000}) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000000)=0x9) 12:39:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) dup2(r1, 0xffffffffffffffff) 12:39:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x100, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x88, r3, 0xa00, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @rand_addr="859d390a92a1a9b0cc57bb644cb776a8"}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x23}}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x100000000}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_SECRET={0x4}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x1) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="9f", 0x1}], 0x10c3, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r4, 0x770a, 0x0) dup3(r0, r1, 0x0) 12:39:18 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x3) ioctl$sock_netdev_private(r1, 0x89f6, &(0x7f00000001c0)="311175f1afc47d45aca823f9358b498483254d7f70515134b33c1f6bbadbe347e0ef08fe973696cf660679d2a53329e41a4eb0201cd0a7bb4a065c648d393fe3fb5ce14ce54c0e4e75b4ab16109ebe97be29314ee0e537c37c2683741c8c619621a07019581fe72f78304ed294960c8b209fbd91221bffaba07a5c4dd9c1d35136834693cf0e183f2eb9f69dbf483be7c1d147803b636b2057f496836095a951c48c6af3bc1d315f4f6bad12ed5d0cc16d4190876eda0862e76c88b8d832e649b7d274640bedecd338429052ed580eabf140cf48a92b242ad1845951c665a3c99dc9f7d291634f3c2137c9384db9c9c1244aec9613d633") ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x0, 0x8f8a}) creat(&(0x7f0000000040)='./file0\x00', 0x14) 12:39:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000400095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be06341761156e257a1a1f35182fdefb0b0b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993186a40ac3bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = open(&(0x7f0000000280)='./file0\x00', 0x10000, 0x8) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f00000002c0)=""/26) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x400}, 0xf) flistxattr(r2, &(0x7f0000000140)=""/40, 0x28) 12:39:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0xfffffffffffffffc}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x460102, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x40000, 0x3b) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'syz_tun\x00', 0x0}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000780)={'bridge_slave_0\x00', 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000600)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000a40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0}, &(0x7f0000000bc0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0}, &(0x7f0000000c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000c80)={@dev, @dev, 0x0}, &(0x7f0000000cc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f00000011c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000001180)={&(0x7f0000000d00)={0x47c, r3, 0xf12, 0x70bd2b, 0x25dfdbfe, {}, [{{0x8, 0x1, r4}, {0xe4, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x7, 0x6, 0x734, 0xd5c6}, {0x9, 0x5, 0x0, 0x87}, {0x5721, 0x1, 0x5, 0x3}, {0x3ff, 0x10001, 0x2, 0x84}, {0x5, 0xfffffffffffffffe, 0x8, 0x40}, {0x5, 0x9, 0x81, 0x92f1}, {0xcd, 0x25, 0x2e1, 0x5}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r6}, {0x258, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0xfffffffffffffc02, 0x0, 0x1, 0x4}, {0x3, 0x80, 0x0, 0x7ff}, {0x80, 0x665, 0x70000, 0x1}, {0x4, 0x1, 0xd48f, 0x200}, {0x9, 0x2, 0x400, 0x7}, {0x81, 0x8cf, 0x2}, {0x9, 0x401, 0x1, 0x8}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xffffffffffffff01, 0xff, 0x2, 0x4}, {0x7, 0x3, 0x40, 0xffffffffffffffd3}, {0x36e175a, 0x9ec9, 0x2, 0x81}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x48, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x0, 0x7, 0xfa6c, 0x5}, {0x5, 0x381, 0xffffffff80000001, 0x1a}]}}}]}}, {{0x8, 0x1, r10}, {0xc4, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x46}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4e2bd18a}}, {0x8, 0x6, r11}}}]}}]}, 0x47c}}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb8, 0x0, &(0x7f00000000c0)="2dfc7e3652f0d8bc2674fed35b95e64b5d9dcd077c80689a94bdf8e02af31764405540e815b0d8fd583ce7a1d68e51ec24d2d5fb8723d0245ad83a4e969ff89a4652d50159ddb0adc3d22662ffa5c8e199633702d978ab0982394d367b6c9a4849e678d461ac44a503de69eba109ca9acaf2f6e4a505edcead950abaaf4a59b525c8ce455c6e0a53b6a2e4124d942290e616d293b7b579d4d538eb7a6634ffffffffffffdd55440a926292ca318984c59ee4451bbaa39dbc", 0x0, 0x402}, 0x28) 12:39:18 executing program 1: r0 = socket$inet(0x10, 0x7fffc, 0x749) sendmsg(r0, &(0x7f0000000380)={0x0, 0x3d, &(0x7f0000000040)=[{&(0x7f0000000080)="240000001a0007041dfffd946f6105000a0000001f00e2ffffff08000800040035000000280000001100ffffba16a0aa1c0900000018004003000000eff24d8238cfa47e23f7efbf54000000", 0x4c}], 0x1}, 0x0) 12:39:18 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="007841d1fe8455f86e23250d45788f", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000280)=""/113) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000240)={0x9, 0x2, 0x7, 0x3, 0x6, 0x0, 0x40, 0x8, 0xfff, 0x0, 0x4, 0x7}) getsockopt$inet6_int(r1, 0x29, 0x5f, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}}], 0x6fe) fsetxattr(r0, &(0x7f0000000180)=@known='system.advise\x00', &(0x7f00000001c0)='/dev/input/event#\x00', 0x12, 0x2) 12:39:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fed62f7a0af0fff8ffffff79a448e656f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b703000061b11dc2a9000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cd5d9b8bc0a9c1d83bd69"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="010d02c652a4a2731e036af944381f9346ca00ce43", 0x15, 0xfffffffffffffffc) keyctl$setperm(0x5, r0, 0x2002000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:39:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0), 0x4800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x3ea, 0xfea7, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000280)) socket$nl_xfrm(0x10, 0x3, 0x6) setfsgid(r1) 12:39:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000800000000feffff7a0af0fff8ffffff79a4b0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b785000000000000950000001a0000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bc1f1abd196407b4c8fabe27b2121a5f03dff2c0000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:18 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56ad8e39808e0b61a0bf7a301ffe8dac072690", @ANYBLOB="e7c14e2d9cfeed7c121c64be18b2c25a30b729ff98a746a1f4aa2124f164c117bac6b1ed1733097c9bcd900c1ec3b637df99d59c5002b39cd636199ecc8d5cebed9c4e6477cac9d0abe49a3745f22032dadb4f32632c4b1dde05531788f91f0a0f1a265b9ac8", @ANYRESHEX, @ANYBLOB="e6c55c649eb82eec510100019b3d7280437a7462010000000000000029a741efca447edda5cce828291d4e698f56890037d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872b0001000000000000f515586de3c101e4f8d1b12b1894ef983d0cfcdfbb1118c5ae060bb6ae2af877735be7b03b5278b53fe125393d6b6adf7f7d0734bc1e"], 0x0, 0x14f}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r1, 0x10, &(0x7f0000000180)={&(0x7f0000000000)=""/164, 0xa4}}, 0x10) close(r1) ptrace$cont(0x7, r0, 0x0, 0x0) 12:39:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0x101, 0x7ff, 0x6, 0x5a, 0x0, 0x0, 0x2040, 0x5, 0x5, 0x3f, 0x7, 0x9, 0xaf, 0x100, 0x20, 0x0, 0x9, 0x2, 0x6, 0x7, 0x3, 0x10000, 0x2, 0x5, 0x100000001, 0xfffffffffffff800, 0xbd, 0x7, 0x5, 0x1, 0x1ff, 0x81, 0x9, 0x5, 0x7, 0x10000, 0x0, 0x100000000, 0x3, @perf_bp={&(0x7f0000000040), 0x9}, 0x20, 0x7fff, 0x7ff, 0x9, 0x7, 0x1, 0x5}, r1, 0xe, r0, 0x8) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000200)=@fragment, 0x8) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000002640)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000002680)=""/2) recvmmsg(r2, &(0x7f0000002300)=[{{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/28, 0x1c}, {&(0x7f0000000400)=""/162, 0xa2}, {&(0x7f0000000280)=""/17, 0x11}], 0x3, &(0x7f00000004c0)=""/84, 0x54}, 0x4}, {{&(0x7f0000000540)=@xdp, 0x80, &(0x7f0000000600)=[{&(0x7f00000005c0)=""/39, 0x27}], 0x1}, 0x81}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)=""/131, 0x83}], 0x1, &(0x7f00000007c0)=""/60, 0x3c}, 0x8000}, {{&(0x7f0000000800)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000880)=""/182, 0xb6}, {&(0x7f0000000940)=""/190, 0xbe}, {&(0x7f0000000a00)=""/199, 0xc7}, {&(0x7f0000000b00)=""/87, 0x57}, {&(0x7f0000000b80)=""/119, 0x77}, {&(0x7f0000000c00)=""/11, 0xb}], 0x6}, 0x9}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/9, 0x9}, {&(0x7f0000001d00)=""/88, 0x58}], 0x3, &(0x7f0000001dc0)=""/118, 0x76}, 0xf7}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001e40)=""/183, 0xb7}, {&(0x7f0000001f00)=""/63, 0x3f}], 0x2, &(0x7f0000001f80)=""/42, 0x2a}, 0x401}, {{&(0x7f0000001fc0)=@rc, 0x80, &(0x7f0000002040), 0x0, &(0x7f0000002080)=""/51, 0x33}}, {{&(0x7f00000020c0)=@generic, 0x80, &(0x7f00000022c0)=[{&(0x7f0000002140)=""/207, 0xcf}, {&(0x7f0000002240)=""/99, 0x63}], 0x2}, 0x5}], 0x8, 0x4c000101, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000000), 0x8) setsockopt$inet6_int(r2, 0x29, 0x38, &(0x7f0000000080)=0x800, 0x4) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init() prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) getpid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f00000026c0), &(0x7f0000002700)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002500)=ANY=[@ANYBLOB="c00000001b0013080000000000000000ffffffff000000000000000000000000ac1414aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000041f3000000000000010100000000000089000000000000000000000000000000000000000000000000000000acffffffffffffff00000000000000000000000000000000ff7f000000000000000062fa781d7ede0000ba6b6e000200"/122], 0xc0}, 0x1, 0x0, 0x0, 0x48010}, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002600)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = getpgrp(0x0) waitid(0x0, r5, 0x0, 0x0, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 12:39:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x804, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x18000000000002a0, 0x1f3, 0x0, &(0x7f0000000100)="6454122f6d290eb9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:18 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 12:39:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:39:18 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x5, 0x5, 0xc072, 0x800}, {0x8, 0x3, 0x9, 0x2}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f00000000c0)='#lo\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000140)=r3) 12:39:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="3a88534a97a8762a515dec93baf4a98161978016df6ec750ae029bc63789b59ee60ceccefa40735c25107d52d18753b4bc561d382db5fa9b1390c0a64f7b4e33e1a4131c48b5acee0e0aba3093af5ec45dd5c0", 0x53}], 0x4}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x806140}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="4c000000bf638dfbd3e3babb8f2113f570cc7959a6a50384593e62c2087ac1ac10d9eb57c8571472f2d8c7997d6e888fd4a65e37c338f3cb0471f39187de6566d3e19b9485ad66a1", @ANYRES16=r3, @ANYBLOB="100328bd7000fddbdf25020000000c000300080004008000000008000600030000002400020008000d0000000000080004008000000008000900ffffff7f0800070001000080"], 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31", 0x32}], 0x1, 0x0, 0xf724d52d8d0ba61}, 0x0) tkill(r1, 0x16) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1645.681091] audit: type=1326 audit(1565181558.602:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=21230 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 12:39:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x9, 0x1e, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x90000, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000280)={0x4, {{0xa, 0x4e24, 0x7fff, @remote}}}, 0x88) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0xa, 0x1f2, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0xea) 12:39:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@alu={0x8000000201a7f2f, 0x0, 0x2}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}, 0x10}, 0x70) 12:39:19 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0x101, 0x7ff, 0x6, 0x5a, 0x0, 0x0, 0x2040, 0x5, 0x5, 0x3f, 0x7, 0x9, 0xaf, 0x100, 0x20, 0x0, 0x9, 0x2, 0x6, 0x7, 0x3, 0x10000, 0x2, 0x5, 0x100000001, 0xfffffffffffff800, 0xbd, 0x7, 0x5, 0x1, 0x1ff, 0x81, 0x9, 0x5, 0x7, 0x10000, 0x0, 0x100000000, 0x3, @perf_bp={&(0x7f0000000040), 0x9}, 0x20, 0x7fff, 0x7ff, 0x9, 0x7, 0x1, 0x5}, r1, 0xe, r0, 0x8) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000200)=@fragment, 0x8) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000002640)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000002680)=""/2) recvmmsg(r2, &(0x7f0000002300)=[{{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/28, 0x1c}, {&(0x7f0000000400)=""/162, 0xa2}, {&(0x7f0000000280)=""/17, 0x11}], 0x3, &(0x7f00000004c0)=""/84, 0x54}, 0x4}, {{&(0x7f0000000540)=@xdp, 0x80, &(0x7f0000000600)=[{&(0x7f00000005c0)=""/39, 0x27}], 0x1}, 0x81}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)=""/131, 0x83}], 0x1, &(0x7f00000007c0)=""/60, 0x3c}, 0x8000}, {{&(0x7f0000000800)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000880)=""/182, 0xb6}, {&(0x7f0000000940)=""/190, 0xbe}, {&(0x7f0000000a00)=""/199, 0xc7}, {&(0x7f0000000b00)=""/87, 0x57}, {&(0x7f0000000b80)=""/119, 0x77}, {&(0x7f0000000c00)=""/11, 0xb}], 0x6}, 0x9}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/9, 0x9}, {&(0x7f0000001d00)=""/88, 0x58}], 0x3, &(0x7f0000001dc0)=""/118, 0x76}, 0xf7}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001e40)=""/183, 0xb7}, {&(0x7f0000001f00)=""/63, 0x3f}], 0x2, &(0x7f0000001f80)=""/42, 0x2a}, 0x401}, {{&(0x7f0000001fc0)=@rc, 0x80, &(0x7f0000002040), 0x0, &(0x7f0000002080)=""/51, 0x33}}, {{&(0x7f00000020c0)=@generic, 0x80, &(0x7f00000022c0)=[{&(0x7f0000002140)=""/207, 0xcf}, {&(0x7f0000002240)=""/99, 0x63}], 0x2}, 0x5}], 0x8, 0x4c000101, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000000), 0x8) setsockopt$inet6_int(r2, 0x29, 0x38, &(0x7f0000000080)=0x800, 0x4) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init() prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) getpid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f00000026c0), &(0x7f0000002700)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002500)=ANY=[@ANYBLOB="c00000001b0013080000000000000000ffffffff000000000000000000000000ac1414aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000041f3000000000000010100000000000089000000000000000000000000000000000000000000000000000000acffffffffffffff00000000000000000000000000000000ff7f000000000000000062fa781d7ede0000ba6b6e000200"/122], 0xc0}, 0x1, 0x0, 0x0, 0x48010}, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002600)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = getpgrp(0x0) waitid(0x0, r5, 0x0, 0x0, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 12:39:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x181000, 0x54) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'veth0_to_team\x00', 0x400}) 12:39:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:19 executing program 2: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{0x7, 0x93d, 0x1000000, 0xffff}, 'syz0\x00', 0x37}) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/pid_for_children\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) setreuid(r3, r4) ioctl$FS_IOC_GETFLAGS(r1, 0xb701, 0x0) 12:39:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f00000000c0)="11dca5055e3330e47bf070") r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000087000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1646.479371] audit: type=1326 audit(1565181559.402:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=21230 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 12:39:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = getpgid(0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2480}, 0xc, &(0x7f0000000100)={&(0x7f0000000900)={0x10b0, 0x1e, 0x100, 0x70bd26, 0x25dfdbff, {0x20}, [@nested={0x94, 0x71, [@typed={0x8, 0x78, @fd=r0}, @generic="41e9d82846379ca467b10e6920ad344afc869edb8ea8688a6d984ab58861eacda950e815e11645a5d0782c3ac88d5ffae1f734b0b56ef9c9cadb8ee7658159653966615b6ca96e629aefd322c41c3a34adfdf1eda0b97f42902f4831e5846bed0ab7fa77b23a06fa2c7058377628bb53cdc7d68dcdd9d3346c9e7de95a79", @typed={0x8, 0x1b, @pid=r2}]}, @nested={0x1008, 0x3, [@typed={0x1004, 0x5f, @binary="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"}]}]}, 0x10b0}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000280)) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) fremovexattr(r3, &(0x7f0000000380)=@random={'os2.', '/dev/ppp\x00'}) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x100, 0x0) ioctl$PPPIOCGDEBUG(r4, 0x80047441, &(0x7f0000000300)) 12:39:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x13, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000280)=""/142) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x9, 0x1f, 0x0, 0xe, 0x4, 0x4, "8cab0b10746554cb6fb0b16f6068bdbf9c161217dc684565fc5f46408a2c4de4818ee3a335340cb6e13ec34c0b7cfece9ecb553c38362e79f1d4aa41a3523f49", "adc169b819585690e47e9a6ba7d6e7499ee212e481a7dcc05ee2d5255d941943777379897ee5e17a38aaaefc1b0721a824727f4df7db3de643510660421c2bbb", "44eb91bd0507bbba8dc2b4d2fa6136b8a2ca9efeacd043c6f22cf9ad4748a75a", [0x6, 0x20ab]}) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x59, 0x0, 0x400000, 0x0, 0x2, 0x0, 0x8000, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xd5, 0x9, 0x0, 0x0, 0x1, 0x3, 0x0, 0x200000000000000, 0x4, 0x0, 0x20000, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x5, 0x0, 0x4000000004000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:21 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:21 executing program 3: r0 = accept(0xffffffffffffffff, &(0x7f0000000100)=@l2, &(0x7f0000000280)=0x80) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, r1, 0x208, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x7}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x16}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="d48e592eb0be1d61b824be3f4a49224a"}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004080}, 0x4000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x40) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000380)={{0x2, 0x1, 0xfffffffffffffffe, 0x3}, 0x8, 0x100, 'id0\x00', 'timer1\x00', 0x0, 0xffffffff, 0x1, 0x98e8}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='setgroups\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x65d0acff818451ec) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x400001, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:39:21 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10, 0x80000) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000400)={0x0, 0x0, 0xa, 0x0, [], [{0x3, 0xd8, 0x100, 0x1, 0xfc6d0, 0xffff}, {0x2, 0x4, 0x8, 0x2, 0xfffffffffffffffb, 0xfff}], [[], [], [], [], [], [], [], [], [], []]}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000280)=@add_del={0x2, &(0x7f0000000140)='bridge_slave_1\x00'}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000002c0)={r1, 0x0, 0x4, 0x2, 0x7}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000380)=0xc) ptrace$poke(0x4, r2, &(0x7f00000003c0), 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0x101, 0x7ff, 0x6, 0x5a, 0x0, 0x0, 0x2040, 0x5, 0x5, 0x3f, 0x7, 0x9, 0xaf, 0x100, 0x20, 0x0, 0x9, 0x2, 0x6, 0x7, 0x3, 0x10000, 0x2, 0x5, 0x100000001, 0xfffffffffffff800, 0xbd, 0x7, 0x5, 0x1, 0x1ff, 0x81, 0x9, 0x5, 0x7, 0x10000, 0x0, 0x100000000, 0x3, @perf_bp={&(0x7f0000000040), 0x9}, 0x20, 0x7fff, 0x7ff, 0x9, 0x7, 0x1, 0x5}, r1, 0xe, r0, 0x8) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000200)=@fragment, 0x8) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000002640)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000002680)=""/2) recvmmsg(r2, &(0x7f0000002300)=[{{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/28, 0x1c}, {&(0x7f0000000400)=""/162, 0xa2}, {&(0x7f0000000280)=""/17, 0x11}], 0x3, &(0x7f00000004c0)=""/84, 0x54}, 0x4}, {{&(0x7f0000000540)=@xdp, 0x80, &(0x7f0000000600)=[{&(0x7f00000005c0)=""/39, 0x27}], 0x1}, 0x81}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)=""/131, 0x83}], 0x1, &(0x7f00000007c0)=""/60, 0x3c}, 0x8000}, {{&(0x7f0000000800)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000880)=""/182, 0xb6}, {&(0x7f0000000940)=""/190, 0xbe}, {&(0x7f0000000a00)=""/199, 0xc7}, {&(0x7f0000000b00)=""/87, 0x57}, {&(0x7f0000000b80)=""/119, 0x77}, {&(0x7f0000000c00)=""/11, 0xb}], 0x6}, 0x9}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/9, 0x9}, {&(0x7f0000001d00)=""/88, 0x58}], 0x3, &(0x7f0000001dc0)=""/118, 0x76}, 0xf7}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001e40)=""/183, 0xb7}, {&(0x7f0000001f00)=""/63, 0x3f}], 0x2, &(0x7f0000001f80)=""/42, 0x2a}, 0x401}, {{&(0x7f0000001fc0)=@rc, 0x80, &(0x7f0000002040), 0x0, &(0x7f0000002080)=""/51, 0x33}}, {{&(0x7f00000020c0)=@generic, 0x80, &(0x7f00000022c0)=[{&(0x7f0000002140)=""/207, 0xcf}, {&(0x7f0000002240)=""/99, 0x63}], 0x2}, 0x5}], 0x8, 0x4c000101, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000000), 0x8) setsockopt$inet6_int(r2, 0x29, 0x38, &(0x7f0000000080)=0x800, 0x4) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init() prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) getpid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f00000026c0), &(0x7f0000002700)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002500)=ANY=[@ANYBLOB="c00000001b0013080000000000000000ffffffff000000000000000000000000ac1414aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000041f3000000000000010100000000000089000000000000000000000000000000000000000000000000000000acffffffffffffff00000000000000000000000000000000ff7f000000000000000062fa781d7ede0000ba6b6e000200"/122], 0xc0}, 0x1, 0x0, 0x0, 0x48010}, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002600)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = getpgrp(0x0) waitid(0x0, r5, 0x0, 0x0, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 12:39:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:21 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$int_out(r0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:21 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) [ 1648.883735] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:21 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1000}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r2 = dup(r1) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xa) 12:39:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x480401, 0x0) write$evdev(r2, &(0x7f00000002c0), 0x0) write$binfmt_aout(r0, &(0x7f0000000380)={{0x107, 0x8001, 0x1, 0xbe, 0x143, 0x0, 0x1ea}, "0e", [[], [], []]}, 0x321) setsockopt$inet6_tcp_buf(r1, 0x6, 0x3f, &(0x7f00000000c0)="408c9bef4b5884fb44ea156020c31f601944cf915052743ba9e868cb5ed32ce0e76ebba197f80da75ecaa0066a27fe8f98e4477c22a4a87881a0a86aedc71fa3d8c6100eaa240991c206ccc3e1692c26dff56afb401c9b9b04c541cb47550564acbedd4e12d02baf2fad6a62409b27c3f966617535522b5ac1b53d7cced68d20d2dc2811d77ce065293451072650", 0x8e) 12:39:22 executing program 3: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0xfffffffffffffffe, 0xffffffffffffffff) openat$cgroup_subtree(r1, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) renameat(r1, &(0x7f00000002c0)='./file0\x00', r1, &(0x7f0000000300)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r1, 0x0, 0xa, &(0x7f0000000100)='\x00bdevem1-\x00'}, 0x30) fcntl$lock(r3, 0x24, &(0x7f0000000280)={0x3, 0x3, 0x7, 0x1000, r4}) [ 1649.330694] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10}, 0x70) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x48000000) r2 = fcntl$dupfd(r0, 0x0, r1) accept4$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xf, 0x9, &(0x7f0000000280)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1200000000000, 0x0, 0x0, 0x0, 0x2}, @ldst={0x1, 0x0, 0x6, 0x7, 0x8, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x17}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, @exit, @call={0x85, 0x0, 0x0, 0x1e}, @exit], &(0x7f0000000300)='GPL\x00', 0x100000001, 0xdc, &(0x7f0000000380)=""/220, 0x40f00, 0x4, [], r3, 0x1f, r2, 0x8, &(0x7f0000000500)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0x3, 0x81, 0x4}, 0x10}, 0x70) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000100)) 12:39:22 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:22 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:22 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$int_out(r0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000140)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) getpeername$netlink(r1, &(0x7f0000000300), &(0x7f0000000380)=0xc) 12:39:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x40800, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000300)={0x7, 0x1b, 0x2}, 0x7) ioctl$KDSETMODE(r1, 0x4b3a, 0x7f) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0xb) socket$packet(0x11, 0x0, 0x300) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000280)={[], 0x8001, 0x100000001, 0x9, 0x80, 0x5d47, r4}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:22 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x400) 12:39:22 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$int_out(r0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:22 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r1, 0x0) syz_open_pts(r2, 0x20102) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:23 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:23 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x12, 0x8, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40}, [@alu={0x7, 0x10000, 0x9, 0xe032fe1d6820c145, 0xf, 0x0, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x33}, @generic={0x0, 0x1670, 0x6904869e, 0x9, 0x4}, @jmp={0x5, 0x7f, 0xe, 0x9, 0xb, 0x30, 0x10}, @call={0x85, 0x0, 0x0, 0x30}]}, &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0xa5, &(0x7f0000000280)=""/165, 0x41f00, 0x3, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0xa, 0x401, 0x4}, 0x10}, 0x70) r1 = socket$packet(0x11, 0x3, 0x300) fcntl$notify(r0, 0x402, 0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file0', [{0x20, 'syzkaller\x00'}, {0x20, 'syzkaller\x00'}, {0x20, 'eth0posix_acl_accesscgrouplo'}, {}, {0x20, 'GPL\x00'}], 0xa, "4740cfad76bbd731b99aa779"}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x7e3f, 0x1, 0x8, 0xa3e8, 0x0, 0x2400000000, 0x2, 0x1, 0x9, 0x800, 0x4f5, 0x7, 0x6, 0x8, 0x101, 0x8000000000, 0x80, 0x6, 0x7, 0x1, 0x2, 0xff, 0xe51, 0x6a, 0x0, 0x3, 0x100, 0x3, 0x8, 0x0, 0x9, 0x2ff, 0x7ff, 0x8000000000000, 0x100, 0x6, 0x0, 0x4, 0x4, @perf_config_ext={0x4, 0x7}, 0x310, 0x5, 0x5, 0x0, 0x7, 0x7fffffff, 0x80000001}, 0x0, 0xffffffffffffffff, r0, 0x8) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x9, 0x3, 0x3, 0xffffffff, 0x0, 0xfffffffffffffc00, 0x40, 0xe, 0x6, 0x7fffffff, 0x6a64427e, 0x1, 0x7f, 0x83d, 0x2, 0x8, 0x100000001, 0x58a, 0x8, 0x9d4, 0xf, 0x100000001, 0x4, 0xf7, 0x7a3a, 0x6, 0xffffffffffffffff, 0x89, 0x9, 0x2, 0x7, 0x1, 0x5, 0x6e0, 0x2, 0x2, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f00000000c0), 0xd}, 0x2000, 0x100, 0x5, 0xf, 0x8001, 0x8, 0x8}, 0x0, 0x7, r1, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000300)) 12:39:23 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$int_out(r0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:23 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='syzkaller\x00', 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0xfffffffffffffc7a, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x3fe}, 0x28) 12:39:23 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d09f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cf763713e18ea8380088c619f5e2b2d926660e22b6ae68f6408e180a4e8a7d22bd55becb9fe2c814e07f55fc335e10f0fc137670ffac13f7fb1960aba1f1e6102f95a84"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) rt_sigaction(0x17, &(0x7f0000000300)={&(0x7f0000000280)="666766460f3a62d8e9660f3a22b504000100fe2e2ef20ff0a54dfc892044835ce1a66565460f74d7f3470f9c2d28d900008fe99892072e660f3806ec663666430f3a2081001000027666f2450f11b300000000", {0x4}, 0x40000003, &(0x7f0000000140)="400b99b69e0000c401797f90e600000041dee065263e660f3a445a00d90fdaf0642a6aff66f30f11024433118f8928954300c48179e79a6011319e"}, &(0x7f0000000540)={&(0x7f00000004c0)="f30faeeac4a1d9e99c61473800003e460f01d7dae9660f3a205b3e00f30fbc56d7c4c215375900c4613a51be20000000c462795933c421f9d7dc", {}, 0x0, &(0x7f0000000500)="c4411169be0cf0ffff44e6fbc463317d81000000005567660f7ea9090000008f2978836103c4c209bb2b64f32e410f482342d8daf2e164660f6cee"}, 0x8, &(0x7f0000000580)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000640)=@ccm_128={{0x304}, "be69c2de74accfd6", "58c945fb859065210c6b85aeac405a84", "e115bffe", "ac3f1b213c3cdfbb"}, 0x28) write$selinux_validatetrans(r1, &(0x7f00000005c0)={'system_u:object_r:auth_cache_t:s0', 0x20, 'system_u:object_r:locale_t:s0', 0x20, 0x46, 0x20, '/usr/sbin/cupsd\x00'}, 0x65) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000100)={0x6, 0x6, 0x2, 0x180000, 0x7f, 0x2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 3: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0xc002, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x18000000000002a0, 0x13, 0x0, &(0x7f0000000280)="e35b4df52eb9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) chdir(&(0x7f0000000100)='./file0\x00') 12:39:23 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:23 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x800) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r3, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x675}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004001}, 0x24004000) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000280)="39b0a05d9371e918d5916c5d68ea9415", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$int_out(r0, 0x0, &(0x7f0000000080)) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000100)='systemmime_type!lo~eth1proctrusted):user\'^-^\x00', &(0x7f0000000140)='()mime_type{\x00', &(0x7f0000000280)='-\x00', &(0x7f00000002c0)='\xa5)user.vboxnet1em0/\x00', &(0x7f0000000300)='syzkaller\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='syzkaller\x00', &(0x7f0000000400)='-\x00'], &(0x7f00000004c0)=[&(0x7f0000000480)='\x00']) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) 12:39:23 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af20000000000000c00281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x180, 0x4) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000100)={0x2e, 0x1, 0x5, 0x19, 0x9, 0x7f, 0x3, 0x27, 0xffffffffffffffff}) 12:39:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) flock(r0, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@loopback, @in6=@ipv4={[], [], @loopback}}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) write$P9_RREAD(r1, &(0x7f0000000380)={0xfe, 0x75, 0x1, {0xf3, "2c65e60fb0172c4faaabe7485f090b6a013e95c7228d35b1f3220e68fec2fbb5c02e0cd1178c085163819016f58bf28a8b6c32a1ead20ee67a2898c0328aa1f53a25c22d727862005a4c0fa9007371b630754d4b115a44f744161eac027fe88c40eab8ee5e0046c8d9b258e901541f9f50780c481bf4bb6b59e761cf7f372bc2b636906a105e1d06771644db7ed4715d3fcd4e8066468d9d85cdad85e01bb13a49aa99ad6711f8f688d5a8addeedb39b1612bea10cd842b211a59f466db511ead0639c8771ba7aff1e513151f51fe80d089ff2c6f381132ea16f1b5acebe84c42055d395cc2b3a517843c00b2aeeb0c955235e"}}, 0xfe) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) 12:39:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x54, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff}, 0x10}, 0xffffffffffffff4d) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x9, 0x100000000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x4000, 0x10000000000, 0x1000000000000, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x44002, 0x0) pread64(r1, &(0x7f0000000280)=""/99, 0x63, 0x0) 12:39:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:24 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:24 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feff556140ae3e1360ef561b54ff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec090000002f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1651.057520] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x202201, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) 12:39:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0xafa, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:24 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) 12:39:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, r1, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) getrandom(&(0x7f00000000c0)=""/1, 0x1, 0x2) 12:39:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0xa0000, 0x38) setns(r1, 0x4000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 5: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) 12:39:24 executing program 5: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000380)=""/199) 12:39:24 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) 12:39:24 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) 12:39:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000100)=@caif=@dgm, &(0x7f0000000280)=0x80) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000002c0)=0x2, 0x4) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000380)=""/207) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x34c, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:24 executing program 5: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 1651.670731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0x1ffffe19, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4000000000000}, 0x10}, 0x18) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) fcntl$setlease(r1, 0x400, 0x3) 12:39:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 5: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) 12:39:24 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:24 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='qfq\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b7000000000000009500000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfb213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c0000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000300)={@loopback, 0x0}, &(0x7f0000000380)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8008004}, 0xc, &(0x7f00000003c0)={&(0x7f0000001040)=ANY=[@ANYBLOB="340500002900140129bd7000ffdbdf2500000000", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r0], 0x534}, 0x1, 0x0, 0x0, 0x80}, 0x4000005) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000004c0)="b9ff030219fc608c2259a04ff4d0", 0x0, 0x403}, 0xffffffffffffff8e) 12:39:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1651.874486] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 12:39:24 executing program 5: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) 12:39:24 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:24 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getpid() bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000300)=0x3, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x10180, 0x0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0xcdd18ac48983679f) 12:39:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:24 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 1652.034591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 12:39:25 executing program 5: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$int_out(r0, 0x0, &(0x7f0000000080)) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x10000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) 12:39:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:25 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:25 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xffffff3d) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000100)=r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:25 executing program 5: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$int_out(r0, 0x0, &(0x7f0000000080)) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:25 executing program 1: accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) socket$key(0xf, 0x3, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) [ 1652.309698] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18020000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859feeb320bf054bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b210da8e41aae4e77364c3951b86cd2e4e2d869fafbec7f321be80832f97bbfc4f57f66196ededbfffbae4dfe7b8d59af7cd43d931929bb226d9a50a79a6765823ba4a48edd0c51b7fd14534bfe19431f82d7380d291537319109a5205d5398d8fc205b65"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:25 executing program 1: accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:25 executing program 5: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$int_out(r0, 0x0, &(0x7f0000000080)) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000100)={0x5, 0x4, 0xa5, 0x0, 0x3}) socket$inet(0x2, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) prctl$PR_SET_FPEXC(0xc, 0x100003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, 0x0) socket$netlink(0x10, 0x3, 0x2) getsockopt$sock_timeval(r3, 0x1, 0x0, 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) gettid() write$P9_RLINK(r4, &(0x7f0000000200)={0x7}, 0x38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) 12:39:25 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:25 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000005700)}, 0x7}], 0x4, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:25 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x800, 0x0) fgetxattr(r0, &(0x7f0000000100)=@random={'os2.', 'syzkaller\x00'}, &(0x7f0000000380)=""/243, 0xf3) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) [ 1652.655686] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:25 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b7001e000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b212123ab3dff2c979570be301d705b26f86b76edccc50e5a325a6d7f13d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000004c0)=ANY=[@ANYBLOB="070000000000000000000000000000000600000000000000", @ANYRES32=r1, @ANYBLOB="00000000ff0300"/28, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\t\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000010000000000000000000000000000000000000000001dd4", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00f\t\x00'/28, @ANYRES32=r0, @ANYBLOB='\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000d18700"/28]) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 12:39:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80000) write$UHID_CREATE2(r1, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0xc0, 0x200, 0x0, 0x0, 0x1, 0x0, "37361e57a6b7d9c6c5225e90db963e23ca87cd3b39240c9841f46b47698a5e386f440df6750100283e3882f784f9b67bc79b965059d2b459188d061ffc8c8f2d3cc6bd44246a1e433b1ca8ac3ebe8ccf8a5a5f239298fc592f5b095676e35dd40fa48d6273f100421a58ca5fa4993a4eaffd7a41574eeaf6ad1f103eb5911ef17b68750c733e7a4b43ead22f1b30dbf26a20d71d16d4f9d30ef99690790b495c1b9a9fd0aa7f0217d365e346b8da46bb67ad173628361216e906421ae58a4498"}, 0x1d8) 12:39:25 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 1653.087641] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:26 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x11) 12:39:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:26 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000100)={0x5, 0x4, 0xa5, 0x0, 0x3}) socket$inet(0x2, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) prctl$PR_SET_FPEXC(0xc, 0x100003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, 0x0) socket$netlink(0x10, 0x3, 0x2) getsockopt$sock_timeval(r3, 0x1, 0x0, 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) gettid() write$P9_RLINK(r4, &(0x7f0000000200)={0x7}, 0x38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) 12:39:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}, {{0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000002cc0)=""/140, 0x8c}}], 0x3, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002a0, 0xffffffffffffff4f, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:26 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x30000, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000006c0)={0x1, &(0x7f0000000300)=[{0x6, 0x7, 0x8, 0x1}]}, 0x10) ioctl$TIOCCBRK(r0, 0x5428) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000002c0)={0x10000000000000, 0x7, "dc846d6ae5475b"}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@initdev}}, &(0x7f0000000500)=0xe8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000ddfeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640d000000000065040400010000000404000001077d60b703000000000000ea0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e400b50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cdbb67ecd91de546926e61e75193b75f6b5d22c5eb237cc77c292a498b69407f973ecf605b552ba0f6a00020000e4f937a1ab4e408490eb54e7b55921c98303b181560bebcbc43c6a71bed84df7814aa6271e954145d249d3ce3cdb9ce379996cef7358cd73fa7a0904c54153c154d6e998f9c579d5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x101, 0x2220, 0x0, 0x1000, 0x40, 0x10000, 0x61f42fbb, 0x1f, 0x7, 0x4, 0x8001, 0x9, 0x1f, 0x2, 0x9, 0x100000001, 0x80000001, 0x5, 0x1, 0x9, 0x1f, 0x3, 0x5, 0x1f, 0x63, 0xfffffffffffff7ce, 0x10001, 0x0, 0x3, 0x80000000, 0x3, 0x0, 0x1000, 0x0, @perf_config_ext={0x1, 0x400}, 0x9208, 0x9, 0x4, 0x6, 0x2, 0x4, 0x9}, 0x0, 0xd, 0xffffffffffffffff, 0x8) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x3) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0xfb0cc4692c4140f7, 0x70, 0x1e, 0xe90, 0x4, 0x1ff, 0x0, 0x8, 0x0, 0x3, 0x1f, 0x100, 0x80000000, 0x80000001, 0x2d2, 0x10000, 0x401, 0x792b2d26, 0xbc3, 0x100, 0xe10e, 0x7, 0x81, 0x9, 0x6, 0x210d, 0x1000, 0x9, 0x7, 0x8000, 0x5, 0x80, 0x2, 0x6205, 0x2, 0x100000000, 0x7fff, 0xfffffffffffffffd, 0x0, 0x9, 0x0, @perf_config_ext={0x3, 0xa7bd}, 0x20004, 0x4, 0x80000000, 0x6, 0x4, 0x8}) setreuid(r2, r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000280)) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000100)={0xc0ff, 0x2}) fdatasync(r1) 12:39:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:26 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc}, 0x2c) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r0, &(0x7f00000002c0)}, 0x10) 12:39:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = dup3(r0, r0, 0x80000) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1653.812019] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) r1 = dup2(r0, r0) write(r1, &(0x7f00000014c0)="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", 0x411) 12:39:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bf8f0000000000f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000e6e4676a00a7002b000000b70000000000000095000000400008000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd1965b93db71abe27b2121a5f03dff2c00000000000db0520b9dc707c603245142182f1ba91d1a8789f95cccfe09f02243ce7162781065e3e9fd8a0c642ea6236f3fbb31bf739587eb7a11eccd01c94f601c0745"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}, {0x0}], 0x3, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r2 = dup3(r0, r1, 0x80000) ioctl$TIOCGISO7816(r2, 0x80285442, &(0x7f0000000100)) 12:39:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:27 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, &(0x7f00000001c0)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0xfffffffffffffffe) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$KDGKBLED(r1, 0x4b64, &(0x7f00000002c0)) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000240)=@v1={0x2, "627ee631"}, 0x5, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000000c0)='cpu&5!!\x00\x00\x00\x01\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\xb6,\xd5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xc4,K\t\x9a\x06\xef+rY\f\xf8,Y$\x9at\xf4\x1a\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f') [ 1654.177917] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0xa, &(0x7f00000000c0)='syzkaller\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r2, 0x4) 12:39:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:27 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) utimensat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{r2, r3/1000+30000}, {0x0, r4/1000+30000}}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000480)=ANY=[@ANYBLOB="060000000000000002000000000000000300000000000000", @ANYRES32=r6, @ANYBLOB="000000000600"/28, @ANYRES32=r7, @ANYBLOB="000000000100"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00[\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00!\x00'/28]) syz_emit_ethernet(0x66, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r8, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) clock_nanosleep(0x5, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000100)) fcntl$setown(r5, 0x8, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) clock_gettime(0x2, &(0x7f0000000040)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') 12:39:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}, {0x0}], 0x2, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:27 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x0, 0x10, &(0x7f00000000c0)={0x0, 0xe, 0x0, 0x1bcb}}, 0xffffffffffffff4b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x101000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000280)=r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, &(0x7f0000001b80), 0x0, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1ab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1654.871484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:27 executing program 5: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, &(0x7f0000001b80), 0x0, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'netdevsim0\x00', 0x1000}) 12:39:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1ab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:27 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, &(0x7f0000001b80), 0x0, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0xfffffdae, 0x0, 0x0, 0x0, 0x40ae, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x8000000000000, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r2 = request_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='syzkaller\x00', 0xffffffffffffffff) keyctl$invalidate(0x15, r2) 12:39:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1ab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, &(0x7f0000001b80)=[{0x0}], 0x1, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1655.064090] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 12:39:28 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'bridge_slave_1\x00', {0x2, 0x4e21, @multicast1}}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/member\x00', 0x2, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000140)=""/113) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r2, 0x90a, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x4}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000300)) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000340)) write$P9_RREAD(r0, &(0x7f0000000380)={0x27, 0x75, 0x1, {0x1c, "a3ee8cf2faccfba78a46242035c954a4077c339fccdd512d40f3c2bf"}}, 0x27) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000400)=0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000440)=0x0) ptrace$setregs(0xd, r3, 0x6, &(0x7f0000000480)="2bae4c7a63") setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f00000004c0)={@local, @loopback}, 0x8) sched_getparam(r3, &(0x7f0000000500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) setsockopt(r1, 0x5, 0x0, &(0x7f0000000580)="60c1d2397088801efa55ef3c81e24f6e20efd420244c528293b1546283905c5f0a03c5844fd79dab9f39096730c5e184911e41a4c566f649b20a0f", 0x3b) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000005c0)={0x0, 0x2, 0x0, 0x6}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) recvfrom$packet(r0, &(0x7f0000000600)=""/205, 0xcd, 0x100, 0x0, 0x0) tkill(r3, 0x35) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @local}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) sendmsg$nl_netfilter(r0, &(0x7f0000001e40)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001e00)={&(0x7f0000000880)={0x1550, 0x9, 0xb, 0x100, 0x70bd28, 0x25dfdbfd, {0xf, 0x0, 0x3}, [@nested={0x180, 0x3e, [@generic="3411ee39af64d6dead9ed1139f202282d187382bf7edecd683fd09a5f368f7344ca08122516d7adfa46433d31f3b8a93700a5e12ceef5114e767abc5efa6353ec0d42c138e106e96e463abb9581c75e8a430bdb1b9adbd3026c4b578354c7a8b35f1ffb6ac1e631dac078cbbb89faef5142bc94075a6d5c3e62b260ce2fac34cd9b1c8d6aa945b48641e12d50fffccc15d66c409fee09a008396a2c31da4a3108c4793a485053ec16bb1396de4bf3960e01e1d370eedf15d7e23a1c0cc44f8256b790710a3f0d90b3f38f46c413b48e74f99cb108ca4540664e24e315f7c291aa1870c6ec2a7d17d33dc249f", @generic="5f587b72ba4929e27905c2f1b1d509f9001e1efd796a6fb5b32b3257a94bc7ace57dcc0475566ba4dd5fbf89dddb028d93a8cdf904474511c283051aac93805af10048480c68768eafa8f9093a5053db5670c1379e0690aeb0f4aa0a712f4fa42a3b88693051e9732059704576219ef27f176548f5abf4c6a78259809b7d60fbc706991a2dea35d6", @typed={0x8, 0xe, @ipv4=@multicast2}]}, @nested={0x214, 0x7f, [@generic="1106e58dfb16400ded832687053986856edaa4518598de", @generic="639556152c90aa42e894c1872111dad1294204e485b263b2cf8c717181badd2ea4855094cfc2161840190b209eecc4ca12ade600aede994bd51fcc2cd374bcfe487282ef0d8bb8645b128ef58a56690782ab721b5233eb0af2b067e9db29cd0b457f2c5f2ff8415078cba6a3955e93469ef503a93e22f0f15ba52a20ab3a2ff8e21d86fdb9baf620493f871194e3769ee52dfeda7aab83625ce16f2019fae6e8813d9215716ee7c78da5c486401641ad364e183cd83c2ac1189528c720be2b84e4964421c40750913fe297cb49a58cfe74037594486787bb6c9a64157b5c3fe12ddca267b86af0d5153df8b14e0390bf43560f2e3877", @typed={0x8, 0x12, @u32=0xfffe00000}, @typed={0xc, 0x41, @u64=0x81}, @generic="06f7df33289d958ac9f0faf8b07ca32776613458ade1ea119f499d6d818bedc3d4745485bdfe99d91279a75e14a3a349b6b9ccaf6a167f1bed16927c551e5de9615150603b90d7eb42e4d2fb70512219dfa1c567ffcb8ed7897751caa9ff52f468a4b1e2cd520088da3debf9d7ed017dfffa31858e8961585f47a19e41c664e3f0110445710816c966b55e33f51d3dab85c4e925dcec98bd8b3692338f6c6132fc5b78b2736eebf8fdfbfdb9a5409f1784390526df48085fe723d7c9910054d885f4594f4ec03992f55e669590af9424e22913be74667a3180b8f9d87aa28fdca6eca9a5f90d02ee93fb3a6ac0e074"]}, @typed={0x8, 0x11, @fd=r1}, @typed={0xb8, 0x40, @binary="8babd7e8e338bd4b24ddefea40363eac5e11508cbbf8ca4ac4ddfd1a510190c40117ecb47f88707abfebb56172402520df4b002dccee47f4ce4e98b76e60791572024323269707f1abe872613b0db919ef2669855e2320af8a51237f452d7013281d4713e1c13f6bff89439ea79764ad6edbecc99322c321492bcda5418cd2d4da4e542c57a5227771e59b5bae788bc13b8107911e0010ee136f9f12f2e73117eaeb668a75e0e52cd89ff0d645b90ce1fca73a20"}, @typed={0x8, 0x96, @str='tls\x00'}, @generic="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", @nested={0x14, 0x82, [@typed={0x8, 0x45, @pid=r3}, @typed={0x8, 0x1f, @uid=r4}]}, @typed={0xc, 0x22, @u64=0x1}, @typed={0xc0, 0x200, @binary="a90d63da4df7d7343d9911cfe1a1db0415cfb9027d7d8cc241c8f626ac6d7097c0f0ad4e1deb46a319542beb2fb714735ffe7da0df9d6916bdbacef1754bd6580c0e018d8cff6f2b54b24f819bfcf151c9f676a67b36d2fe23e6b3fffc3f3632733f6f70edf818270642ab08c73506feca4cad6351642420e98cc2114ac7b96e4bce6ba61e02d3a1bcf2a29063b268dc11436403e17c773169ffb5ee3406065ea21827aed62819fd1c39d69ff694eafbc89788c48b15124c47c1"}]}, 0x1550}, 0x1, 0x0, 0x0, 0x4040001}, 0x4000080) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000001e80), &(0x7f0000001ec0)=0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002000)={0xffffffffffffffff, 0x10, &(0x7f0000001fc0)={&(0x7f0000001f40)=""/69, 0x45, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002080)={r0, 0x10, &(0x7f0000002040)={&(0x7f0000001f00)=""/61, 0x3d, r5}}, 0x10) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000020c0)={@dev={0xac, 0x14, 0x14, 0x13}, @multicast1, 0x1, 0xa, [@empty, @multicast1, @multicast2, @remote, @dev={0xac, 0x14, 0x14, 0xe}, @dev={0xac, 0x14, 0x14, 0x28}, @loopback, @multicast2, @loopback, @remote]}, 0x38) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000002100)={'ah\x00'}, &(0x7f0000002140)=0x1e) 12:39:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, &(0x7f0000001b80)=[{0x0}], 0x1, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x30, r2, 0x202, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x14, 0x13, @l2={'eth', 0x3a, 'ip6erspan0\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) socket$inet6(0xa, 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600)={@local, r3}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x3) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0xffff, 0x0, 0x4}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) syz_genetlink_get_family_id$tipc(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x6, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@alu={0x7, 0x400, 0xb, 0x9, 0x7, 0xfffffffffffffffe}, @jmp={0x5, 0x8, 0xb, 0xa, 0x5, 0x1e, 0x10}, @ldst={0x0, 0x3, 0x7, 0x7, 0x7, 0x30, 0xfffffffffffffffc}]}, &(0x7f0000000200)='syzkaller\x00', 0x50, 0x5d, &(0x7f0000000300)=""/93, 0x41100, 0x4, [], 0x0, 0x1f, r4, 0x8, &(0x7f0000000400)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0x6, 0xff, 0x81}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) 12:39:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:28 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, &(0x7f0000001b80)=[{0x0}], 0x1, &(0x7f0000001c00)=""/4096, 0x1000}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}, 0x1b}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000008703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b70300002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e67c279341bf489903cfd69be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf5782fbe745da476b5ef30876ad82e00fd6bdf52e3abf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec74602f925b6dbd29f21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, &(0x7f0000000680)=""/221, 0xdd}, 0xffff}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x2, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000100)=0x3, 0x4) [ 1655.807877] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000100)={0x1ff, 0x1d7b, 0xd6, &(0x7f0000000380)="cfb14d7bfcdfe1a13ecdf1cb481f7377a405fc3ce9936dcde40d20bc781a5a63a06938ece8613030911b4326ced88c1f4d1ff14bd5404e4f64e16dba1cf2766b51c90d77b82e1bf98c4f6841aabf591421a8ababf59788a95eec8a40ea03380b06b4c2bc2fdf6bff118eebaf6120ccb068d7ce511c761bc61379c8b0018857282911e38ba931e15cd651296632167e58dbbdedeff157b216de7ac065240b8ff73de32750da06974e42dc24456a558aff757de66b9490a97896e515ab5fbdff5f5e822e7bfefbbd84815070984480f87fe9afb4cb1846"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:29 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:29 executing program 5: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:29 executing program 5: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000000c0)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1656.301275] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 12:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:29 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/dev\x00') sendfile(r0, r1, 0x0, 0xfffc) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)={0x1, 0x8, [@local, @remote, @random="5574311f86bf", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @empty, @remote, @broadcast, @random="8083eafcb66f"]}) 12:39:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)}}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101000, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 12:39:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 5: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RFLUSH(r0, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) 12:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)}}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000280)=0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x59) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x7d) 12:39:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)}}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:29 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv6_deladdr={0x18, 0x15, 0x1}, 0x18}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/if_inet6\x00') ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x0, 0x1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 12:39:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000040)={'bond_slave_1\x00', @ifru_hwaddr=@dev={[], 0x12}}) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r3 = fcntl$dupfd(r1, 0x406, r1) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x4) setresuid(r2, 0x0, 0x0) time(&(0x7f0000000000)) ioctl$UI_DEV_CREATE(r3, 0x5501) timerfd_create(0x7, 0x80800) 12:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{0x0}], 0x1}}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 1656.801283] ip6_tunnel:  xmit: Local address not yet configured! 12:39:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x13, 0x806, 0x3, &(0x7f0000001c00)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001c80)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000001f00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001cc0)={0x1d0, r2, 0x10, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100000001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffff5c2}]}, @TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffa}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}}}}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffd}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6c4}]}, @TIPC_NLA_LINK={0x8c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff80000001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x40000}, 0xd0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xfffffffffffffe04, &(0x7f0000000480)=[{&(0x7f0000000380)=""/199, 0xc7}], 0x1, &(0x7f00000004c0)=""/154, 0x9a}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1b, 0x9, &(0x7f00000000c0)=@raw=[@jmp={0x5, 0x3a8c, 0x1, 0xa, 0xf, 0x20, 0x10}, @jmp={0x5, 0x9, 0x0, 0x3, 0x3, 0xfffffffffffffffe, 0xfffffffffffffffc}, @jmp={0x5, 0x8001, 0xf, 0x0, 0x9, 0x20, 0x10}, @alu={0x7, 0xf8, 0x8, 0x4, 0x6, 0x2, 0xffffffffffffffff}, @generic={0x10001, 0xffffffff00000001, 0x44, 0x4655, 0xfff}, @alu={0x7, 0x7, 0x0, 0xb, 0x4, 0xffffffffffffffe0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x5c}, @ldst={0x2, 0x3, 0x3, 0xa, 0x7, 0xfffffffffffffff4, 0x1}, @ldst={0x3, 0x0, 0x2, 0x2, 0xf, 0xffffffffffffffff, 0xfffffffffffffffc}], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x3c, &(0x7f0000000280)=""/60, 0x40f00, 0x1, [], r3, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x1, 0x2, 0x3f}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0xfc, 0x0) fcntl$setlease(r0, 0x400, 0x3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000140), 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/94, &(0x7f00000000c0)=0x5e) sendfile(r2, r3, 0x0, 0x80000001) 12:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{0x0}], 0x1}}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{0x0}], 0x1}}], 0x1, 0x0, &(0x7f0000006c00)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:30 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:30 executing program 5: getpgid(0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fdatasync(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x3f6) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) 12:39:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 12:39:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x40, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55d8dd4b, 0x0, @perf_config_ext}, 0x0, 0x800007, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x80, 0x4) 12:39:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x3fffffffd) ppoll(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), 0x8) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x3) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r5, 0x10, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4040) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0xffffffffffffffff) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000240)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000380)) sendmsg$inet(r0, 0x0, 0x10000020048800) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1657.202003] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:30 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:30 executing program 3: prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x1, 0x0, 0x0, 0x0, 0x400}}) 12:39:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 12:39:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8500000007000000d4000000400000009500000000000000"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 12:39:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@loopback, @in=@multicast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000100)=0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x10000}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001a80)=""/34, 0x22}], 0x1}}, {{0x0, 0x0, 0x0}, 0x2}], 0x4, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) preadv(r3, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) [ 1657.601546] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) 12:39:30 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000600)={0x0, 0x364, &(0x7f0000000000)=[{&(0x7f00000000c0)="5500000018007f5800fe01b2a4a280930a06000000a84599910000003900090008000c00010000001900150006000000000000dc1338d54400009b84136ef75afb83de44b2ee3b2733c9237f8d621a4559e65517b3", 0x55}], 0x1}, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f0000000640)=@delqdisc={0x544, 0x25, 0xc00, 0x70bd29, 0x25dfdbfe, {0x0, r2, {0x1, 0xf}, {0xd, 0xf}, {0xc}}, [@TCA_STAB={0xe8, 0x8, [{{0x1c, 0x1, {0xffffffffffff8000, 0x7f, 0x100, 0x3, 0x1, 0x7caa, 0x1, 0x3}}, {0xc, 0x2, [0x4, 0xb2a8, 0x9]}}, {{0x1c, 0x1, {0x3f, 0x1f, 0xffffffff00000000, 0x6, 0x1, 0x4, 0x6d, 0x2}}, {0x8, 0x2, [0xffff, 0x1]}}, {{0x1c, 0x1, {0x5, 0xfffffffffffffffd, 0x5d19, 0xffffffff, 0x1, 0x6579, 0x101, 0x3}}, {0xc, 0x2, [0x7, 0x6, 0x7]}}, {{0x1c, 0x1, {0x1, 0xfff, 0x7f, 0xfffffffffffffff7, 0x0, 0x40, 0x7, 0x1}}, {0x8, 0x2, [0x1]}}, {{0x1c, 0x1, {0x2, 0x8, 0x1, 0xffffffffffff8001, 0x2, 0x4e0, 0x7fffffff, 0x1}}, {0x8, 0x2, [0x9]}}, {{0x1c, 0x1, {0x9, 0xf6bf, 0x9, 0x1, 0x1, 0x4f3, 0x4, 0x3}}, {0xc, 0x2, [0x10001, 0x0, 0x400]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x591b}, @qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x418, 0x2, [@TCA_CBQ_WRROPT={0x10, 0x2, {0x4, 0x8, 0x7, 0x3, 0x4, 0x3ff}}, @TCA_CBQ_RTAB={0x404, 0x6, [0xffff, 0x7, 0x56, 0x6, 0x7, 0x8, 0x8, 0x3, 0x73, 0x1, 0x9, 0x2, 0x3, 0x4, 0x3f, 0x8, 0x800, 0x9e3, 0x1, 0x4f2, 0x7, 0xdcd0, 0x1b99, 0xf5e, 0x8, 0x401, 0x2, 0xfff, 0x0, 0x8, 0x10001, 0x8, 0x6, 0x6, 0x2, 0xb28, 0x1, 0x1ff, 0x3, 0x9419, 0xfffffffffffffff7, 0x7fffffff, 0x100000000, 0xffffffffffffffff, 0x200, 0x1, 0x5, 0x31, 0x7, 0x4, 0x57c, 0x5, 0x995, 0x2, 0x2e4e2dfa, 0xffffffffffffffee, 0x6, 0x40, 0x9d30, 0x1, 0x8691, 0x2, 0x726c, 0xd6a, 0x3ff, 0x7, 0x4, 0x40, 0x6, 0x6, 0x10000, 0x4, 0x6, 0x7, 0x4, 0x0, 0x3ff, 0x767790f, 0x1, 0x4, 0x1, 0x6, 0x5, 0x3f, 0x9, 0x2, 0x5, 0x20b, 0x20, 0x100000001, 0x7, 0x8, 0x0, 0x81, 0xffffffffffff707c, 0x6, 0xbc, 0x7, 0x4, 0x5, 0xac, 0x100000001, 0x8, 0x3, 0x1f, 0x3, 0x5, 0x80, 0x6e7d, 0x1000, 0xfffffffffffffffa, 0x3ff, 0x9b8f, 0x20, 0x20000000000, 0xffffffff, 0x1000, 0x1, 0x3, 0x2, 0x9, 0x6, 0x100000001, 0x40000000, 0x6, 0x4, 0xffffffffffffffc0, 0xbd7, 0x5, 0x1000, 0x5a, 0x0, 0x0, 0xff, 0x401, 0x5, 0x9, 0x2, 0x6, 0x7ff, 0x3f, 0x7c9, 0x5, 0xb637, 0xc5e, 0x2, 0x0, 0x6, 0x7, 0xfffffffffffff000, 0x5, 0x5, 0x0, 0x7cd, 0x3ff, 0x81, 0x5ea0ffdd, 0x9, 0x4fd, 0xfa3f, 0x9, 0x0, 0x6, 0xbeff, 0x5, 0x7fffffff, 0x0, 0x3f, 0x7ff, 0x1, 0x9, 0xfd, 0x6, 0x3, 0xfff, 0x0, 0x5, 0x1, 0x0, 0x0, 0x81, 0x7, 0x9, 0x38, 0x800, 0xfffffffffffffffa, 0x1c, 0x5, 0x4, 0x7, 0x10000, 0x2, 0x5, 0x1f, 0xfffffffffffffff9, 0x7, 0x3d, 0xad8, 0x0, 0x10001, 0x100000001, 0x9, 0x1ee, 0xefe, 0x8, 0x6, 0x8, 0x0, 0x20, 0x3, 0x80000000, 0x1, 0x81, 0x8, 0x800, 0xfdfc, 0x81, 0x1, 0x101, 0x3, 0x1000, 0x5, 0x26, 0x8fea, 0xc9, 0x8, 0x3, 0x4, 0x2, 0x100, 0x0, 0x9, 0x3, 0xffffffffffff0001, 0xff, 0x100000000, 0x1000000000000000, 0xfffffffffffffffd, 0x8, 0x3, 0xff, 0x35, 0x1000, 0x1f, 0x3, 0x7, 0x7, 0x7, 0xff, 0x8d40000000000000, 0x6, 0x5, 0x0, 0x2, 0xfffffffffffffbff, 0x3]}]}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x100}, @TCA_RATE={0x8, 0x5, {0x0, 0xb5}}]}, 0x544}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008000) 12:39:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1657.737396] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 1657.744004] IPv6: NLM_F_CREATE should be set when creating new route [ 1657.750631] IPv6: NLM_F_CREATE should be set when creating new route [ 1657.762059] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 1657.768614] IPv6: NLM_F_CREATE should be set when creating new route [ 1657.797622] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 12:39:30 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) 12:39:30 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) prctl$PR_SET_FPEMU(0xa, 0x2) r3 = perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x70, 0x2, 0x472, 0x8, 0x8001, 0x0, 0x3, 0x300, 0x8, 0xfffffffffa8f86e1, 0xfffffffffffffe01, 0x4, 0xfb18, 0x6, 0x8, 0x80000000, 0x25e, 0x6, 0xa03, 0x2, 0x1000, 0x9, 0x0, 0x3, 0x40, 0xffff, 0x7fffffff, 0x6, 0x9, 0x0, 0x1ff, 0x80, 0x7, 0x3f, 0xfff, 0x7, 0x9, 0x0, 0xe178, 0x2, @perf_config_ext={0x7f}, 0x303, 0x800000000000, 0x200, 0xb, 0x1, 0xd8, 0x8000}, r2, 0xf, 0xffffffffffffffff, 0x8) r4 = socket$inet6(0x10, 0x80000000003, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v2={0x2000000, [{0x83, 0x1}, {0x0, 0x4}]}, 0x14, 0x3) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x10001, @empty, 0x5}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f00000001c0)={0x20002000}) 12:39:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") open(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf36, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="64b98ba56faa725103a387cc68c19256f153a7", 0x13, 0xfffffffffffffffb) r2 = request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='em0\x05*', 0x0) keyctl$search(0xa, r1, &(0x7f00000001c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) 12:39:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) 12:39:30 executing program 3: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, 0x0, 0x0, 0x0) 12:39:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:31 executing program 3: personality(0x8) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) ptrace$cont(0xffffffffffffffff, r1, 0x7fff, 0x98) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x848076945b5968d8) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r4 = socket$nl_route(0x10, 0x3, 0x0) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) r6 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r7 = epoll_create1(0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0xe, 0x5, @thr={0x0, &(0x7f00000000c0)="a674b6fc2e1d57b3ee95644f74d05d7f314fc86fd2747394485e99c870ebf9f185f08e704ac993dc563859c17ef00b78628b36c9d95ca29520b7a75be956f5fbd70d20eeed9f7f6019a95db241e4691ffefdbdcffd265bc212c324e3f9fd1b51b669083d6b956fa431ea67dd829ba90213ad9790b161e7486027c8b044037c563ff7cdec4ca3a2ffd350e927f8eca0251e4e18b4cc36aaa72b125ee167909ff0128aaaf79d7f0426f597633f4b99f222acae873fa81eb23bf4453b76ea0ffd0831f43b2b6606c2a7702643d8e0be77dc0f6056f6e3ea184b49bf037c36b271f91b9f8d3a2087b3736f"}}, &(0x7f0000000200)=0x0) timer_settime(r8, 0x0, &(0x7f0000000240)={{0x0, 0x989680}}, 0x0) epoll_pwait(r7, &(0x7f0000000000)=[{}], 0x57f2748, 0x8, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) ptrace$getenv(0x4201, r9, 0x0, &(0x7f00000002c0)) [ 1658.034191] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:39:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1658.167422] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1658.222635] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22171 comm=syz-executor.3 [ 1658.237197] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22171 comm=syz-executor.3 [ 1658.255155] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22171 comm=syz-executor.3 [ 1658.271746] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22171 comm=syz-executor.3 12:39:31 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, 0xffffffffffffffff) 12:39:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, 0x0, 0x0, 0x0) 12:39:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1658.313645] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22171 comm=syz-executor.3 [ 1658.330967] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22171 comm=syz-executor.3 12:39:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) [ 1658.358126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22171 comm=syz-executor.3 [ 1658.379146] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22171 comm=syz-executor.3 12:39:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x840, 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x730, 0x70bd25, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}}, 0x850) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x401, 0x100000000, 0x3, 0xb03, 0x0, 0x1f, 0x4080, 0x1, 0x0, 0x5, 0x2, 0x5, 0x6, 0x101, 0x0, 0x8, 0x0, 0x200, 0x8001, 0x8, 0x8, 0x43, 0x1ff, 0x401, 0x5ee7, 0x0, 0x4, 0x80, 0x4, 0x2, 0x0, 0xc2bf, 0x6, 0x19e, 0x2, 0x40, 0x0, 0x5, 0x5, @perf_bp={&(0x7f0000000040), 0x1}, 0x2108, 0xa73, 0x3, 0x0, 0x5, 0x0, 0xfffffffffffffff9}, r3, 0x9, r0, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff1e}, 0x48) 12:39:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, 0x0, 0x0, 0x0) 12:39:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1658.464634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22171 comm=syz-executor.3 [ 1658.481168] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22171 comm=syz-executor.3 [ 1658.518999] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 12:39:31 executing program 3: personality(0x8) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) ptrace$cont(0xffffffffffffffff, r1, 0x7fff, 0x98) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x848076945b5968d8) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r4 = socket$nl_route(0x10, 0x3, 0x0) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) r6 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r7 = epoll_create1(0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0xe, 0x5, @thr={0x0, &(0x7f00000000c0)="a674b6fc2e1d57b3ee95644f74d05d7f314fc86fd2747394485e99c870ebf9f185f08e704ac993dc563859c17ef00b78628b36c9d95ca29520b7a75be956f5fbd70d20eeed9f7f6019a95db241e4691ffefdbdcffd265bc212c324e3f9fd1b51b669083d6b956fa431ea67dd829ba90213ad9790b161e7486027c8b044037c563ff7cdec4ca3a2ffd350e927f8eca0251e4e18b4cc36aaa72b125ee167909ff0128aaaf79d7f0426f597633f4b99f222acae873fa81eb23bf4453b76ea0ffd0831f43b2b6606c2a7702643d8e0be77dc0f6056f6e3ea184b49bf037c36b271f91b9f8d3a2087b3736f"}}, &(0x7f0000000200)=0x0) timer_settime(r8, 0x0, &(0x7f0000000240)={{0x0, 0x989680}}, 0x0) epoll_pwait(r7, &(0x7f0000000000)=[{}], 0x57f2748, 0x8, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) ptrace$getenv(0x4201, r9, 0x0, &(0x7f00000002c0)) 12:39:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='attr/sockcreate\x00+%\xb1_\x1b\xc4\xe8;\xfd\x9e\xcf\xe1\xea\xa00p\x00G\xbd\xb2\xe2r\x1a#s\xb4\xe6\xc3\r\x1fCj\xa3;\xe2Z\xc4O\x19g\xa3\x9d\x8c%\xd3\x88\xf1\xa9\xf5@U\x97\x13\x9dw\x9f\x8chm*\xd3*\x89v0\x9a\xf7a9!4\\\xf7\xf0\x1di\x8f\xc2|\x9a') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 12:39:31 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x101041, 0x93) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000140)) write$eventfd(r0, &(0x7f0000000100)=0x6, 0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x342, &(0x7f0000000000)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1, 0x0, 0x203}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/ke\xff\x0f\x00\x00\x00\x00\x00\x00') chdir(&(0x7f0000000200)='./file0\x00') time(&(0x7f0000000080)) bind$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) unshare(0x101040000010ffe) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) 12:39:31 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x9, 0x200001) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) gettid() gettid() bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r0, 0x88a1, 0x8}, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000180)=0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x280003, 0x1) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000680), 0x80000) r4 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x10001, 0x3) r5 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RGETLOCK(r1, &(0x7f00000002c0)={0x23, 0x37, 0x2, {0x1, 0x8, 0x0, 0x0, 0x5, 'bdev['}}, 0x23) r6 = openat$cgroup(r5, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) sysinfo(&(0x7f0000000580)=""/154) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$inet(r3, &(0x7f0000000440)={0x2, 0x0, @empty}, &(0x7f0000000480)=0x10) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 1658.686091] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 12:39:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0xc0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r1, 0x3e, 0x9f}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'ghash-generic\x00'}}, &(0x7f0000000180)="324ac3f19aafd3feab7db52cbfc8707027c6dc62567e4a1d78003c519f5e5610e980714be8607385104736f31a806d118b8b29fbecfa57d33db325c1c3fd", &(0x7f0000000200)=""/159) 12:39:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:31 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, 0xffffffffffffffff) 12:39:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x19) getpid() r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132540) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = gettid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x6, 0x1, 0x1, 0x1, 0x80000000, 0x400, 0x5}, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) setsockopt$inet6_buf(r1, 0x29, 0x2a, 0x0, 0x11e) epoll_create(0x5) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x31) fcntl$setstatus(r1, 0x4, 0x800) 12:39:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) eventfd(0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000040000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000802}, 0x20000001) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f000000ad40)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f000000ae00)={0x0, 0x0, &(0x7f000000adc0)={&(0x7f000000ad80)={0x14, r2, 0x121}, 0x14}}, 0x0) 12:39:31 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x3, 0x7ff, 0x0, r4}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000000)=0x72, 0x4) r5 = accept4$unix(r1, 0x0, 0x0, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000140)={0x43}, 0x43) recvmsg(r5, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 12:39:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netfilter\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 12:39:32 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') write$UHID_INPUT2(r0, &(0x7f0000000000)={0xc, 0x87, "23d44720a946f283d9c4f7d673060361d80b38b47eed7b294b49ea488cbbaa91a85a1d50a7adaaa26f56a0971b8b51e5a89d975bf433badc2af98a5a6a859c3e087f9964002df3d955479628b129a656335eccc637f549f43c3620c7397a5373049616befa01aed4b0f0876f9b7dd0582aaba4dc00ce069dd158bfbb261497d22b58702e941eca"}, 0x8d) preadv(r0, &(0x7f0000000100), 0x312, 0x0) 12:39:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000080), 0x8) eventfd(0x2) splice(r1, 0x0, r2, 0x0, 0x200, 0x0) 12:39:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x546, 0xfffffffffffffffc, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:32 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, 0xffffffffffffffff) 12:39:32 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='/', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(r0) getcwd(&(0x7f0000000500)=""/149, 0x95) [ 1659.219396] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x402}, 0x28) 12:39:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x81) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 12:39:32 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000440)=ANY=[@ANYBLOB="00000100000000002f6ef465cc522fd0a74fb22f0eefb305d189e10e932d03b4a55a4baeda3476649f6efb0971d121"]) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='oom_score\x00') getpgid(0x0) sendmsg$nl_generic(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000003e40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40c1}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xa0001, 0x0) fdatasync(r2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x584c07d9, &(0x7f0000000980), 0x100000000000008a, 0x0, 0xfffffffffffffe03}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r3, &(0x7f0000000400)=""/46, 0x2e) r4 = socket$inet6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000d2c000/0x3000)=nil, 0x3000, &(0x7f0000000480)=""/4096) mmap(&(0x7f0000e12000/0x4000)=nil, 0x4000, 0x2000000, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f000064b000/0x3000)=nil) munlockall() r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) write$P9_RFLUSH(r1, 0x0, 0xfffffffffffffece) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000001600)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000001700)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r7}) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000240)={0x7, 0x5}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @mcast2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20000, r8}) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000300)) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000002c0)={@remote, 0x7e, r8}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000180)={@mcast2, @mcast1, @loopback, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffb8fa, 0x83420004}) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000008c0), 0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"]) 12:39:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x10000000000002e9}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x38) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/mnt\x00') r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) recvmsg(r1, &(0x7f00000004c0)={&(0x7f0000000440)=@alg, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000840)=""/150, 0x96}, {&(0x7f0000000900)=""/216, 0xd8}, {&(0x7f0000000a00)=""/79, 0x4f}, {&(0x7f0000000a80)=""/228, 0xe4}, {&(0x7f0000000b80)=""/139, 0x8b}, {&(0x7f0000000c40)=""/99, 0x63}, {&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000000cc0)=""/113, 0x71}, {&(0x7f0000002bc0)=""/4096, 0x1000}], 0x9, &(0x7f0000000e00)=""/243, 0xf3}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup2(r0, r2) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) write$nbd(r3, &(0x7f0000000f40)={0x67446698, 0x1, 0x0, 0x1, 0x3, "ef80ca24f1b480df8d337237fded94720b3535c35793f1069bf7e0efd5dea792d1dcdc126d5737d73ce4d821d98c06202b503354bd736465274f6ed29a8bdce287fdac135eff28b9ef6c8f56e9de9bb4742dc5dfb8cea8b5ee5f603ba78134c9bc5d51274d084d6c911205cf68"}, 0x7d) socket$netlink(0x10, 0x3, 0x12) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000f00)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xa0, r5, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_bridge\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000001}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="0402000012e639b9d1fa16002f726c30d22d9d31e868cb94318f986488084bff8fa830a967c62e86d72351ccf9e7fccc59b3a5a8dde85af5d74dd94670e186de5ad49c7da989bd5cbb5d652b3989ddfe18f8c2958f77e969cff1989d29560e7afe8995bed34774e3acefcf2b90c8fca720a8722bd0492e3894c9a0edacf41fa169119d7f317af35d3a5248c06a278a737f4996fe6f2329411aaa4dcdf58d5c19e72901b9c0b8c0322dca0439271660e81e81382b41cacbb8156a74c47a9ecd4f53ebe95b31f3bc24317f3721ae48b3fd791f29d321f1251fa44938d8c3bea6ffa0ecbc69782db07cb7c1c08b9c3fa9", @ANYRES16=r5, @ANYBLOB="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"], 0x204}, 0x1, 0x0, 0x0, 0x1}, 0x4004) perf_event_open$cgroup(&(0x7f0000000140)={0x7, 0x70, 0x93d, 0x101, 0x7, 0xfffffffffffffffb, 0x0, 0x9, 0x80000, 0x8, 0x0, 0x4, 0xc0000, 0x379d, 0x7, 0x7, 0x10001, 0x40, 0x2, 0x6, 0x6fd, 0xfffffffffffffeff, 0x2, 0xff, 0x10000, 0x80, 0x7, 0x8001, 0xfffffffffffffffa, 0x2, 0x6, 0x6, 0x9, 0x766c, 0x74, 0x2e, 0x7, 0x0, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000100), 0xc}, 0x2200, 0x5, 0xc8, 0x3, 0x101, 0x0, 0x8001}, r4, 0x8, r4, 0x8) [ 1659.606530] audit: type=1400 audit(1565181572.532:204): avc: denied { create } for pid=22301 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 [ 1659.701886] FAT-fs (loop3): bogus number of reserved sectors [ 1659.710751] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1659.825586] FAT-fs (loop3): bogus number of reserved sectors [ 1659.833281] FAT-fs (loop3): Can't find a valid FAT filesystem 12:39:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') readahead(r0, 0x7f, 0x5) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x402}, 0x28) 12:39:32 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='system_u:object_r:dbusd_exec_t:s0 system_u:system_r:kernel_t:s0 0'], 0x41) 12:39:32 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x8}}) 12:39:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') 12:39:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 12:39:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x800007fd, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffff) 12:39:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10020) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20000018) 12:39:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0xc, 0x4, 0x81000000004, 0x665, 0x0, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 12:39:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 12:39:33 executing program 3: io_setup(0x6, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{0x304}, "58d84afbc69adfbf", "0bf74429ae42dfdf7e34fa2eaabe15f6", "d0305edf", "cc0719a65b953560"}, 0x28) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:39:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}]}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x402}, 0x28) 12:39:33 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 1660.448216] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1660.465736] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 12:39:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0xffffffff7fffffff, 0x5, 0x8, 0x2, 0x0, 0x0, 0x20400, 0x2, 0x0, 0x1, 0x4, 0x6, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0x9, 0x100000001, 0x8, 0x6, 0x438a, 0x8, 0x400, 0x1, 0x1662, 0x3f, 0x0, 0xffffffffffffff01, 0xb40, 0x8, 0x80000001, 0xffffffffffffff80, 0x0, 0xff, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x9}, 0x40, 0x0, 0x3, 0xf, 0x6, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x3) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0x0, 0x7, 0x0, 0x0, 0x0, 0x6000000000000000}, 0x118) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) prctl$PR_GET_NO_NEW_PRIVS(0x27) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x40, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000080)={0x0, 0x0, 0xa627, 0x6}) sendto$packet(r1, &(0x7f0000000340), 0xffffff55, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clock_getres(0x0, 0x0) 12:39:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x1d, 0x4) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 1660.502012] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1660.509544] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 12:39:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:33 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_snmp6\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 1660.627160] device lo entered promiscuous mode 12:39:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001840)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000007c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000001940)=r1) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:33 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f000000efcc)={{0x100000001}}) [ 1660.757834] device lo left promiscuous mode 12:39:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x402}, 0x28) [ 1660.868095] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x402}, 0x28) 12:39:33 executing program 3: 12:39:33 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="24000000cb5ee876b02e0843cf0375a434b5dc7588c1c16062ba34a75a359b639a39180a060093da364e60a090c8452c77248c63a64ec2e6e14df4a38367491786e79831cf96e7e970d525ad5dc9e5ce1cec6750971096518f80839566ae789b55a9a4dbfc727b9731d4e207435eb0b26d4daf6a88991aa6d0d083564283bb583ac56a7845d5c24cb91c128d393c59f6f45840bf309f1720ad7db2c2eafe0c11c18eb8516fa4ed919c741dbd9863c3d5c2e486ef9c286e5b0da6f38295c75a6fe702c9e9d3b27494eb8d81788b73124454222f4dc7de53e412dde87c108d3edaa1869c24d5d685d5e1f580", @ANYRES16=r1, @ANYBLOB="200027bd7000fddbdf250300000008000800ffffffff0800040002000000"], 0x24}, 0x1, 0x0, 0x0, 0x4080}, 0x4000000) 12:39:33 executing program 5: 12:39:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x402}, 0x28) 12:39:33 executing program 3: 12:39:33 executing program 5: 12:39:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x402}, 0x28) 12:39:33 executing program 3: 12:39:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x100) fcntl$setpipe(r0, 0x407, 0x9b5a) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r1, &(0x7f0000000040), 0x67, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v1={0x2, "7a1940"}, 0x4, 0x1) clone(0x2000000, &(0x7f0000000200)="5ac8c8f9eb7829079fdd5bacb176d49b8e29c30405782b4c1e24bef28c379fe979a269a15f732d77ec973d7ba41982e27be1e1747cc7ce898b418f5149cf4c03b18a8dee422790316ff83d90c4a4fa76fb8941878d056b934e41aa57cd780ad65c7aa223fdce22880bd3c732303201c98437edd9d514edef44b77a53f6e5db0a1127e297eb0a0abe0855c20960c3659d3a8cdd63b6c72214c4075d87d5949a7ab7ac75dc6ae0d12fbd675813d74799d3ccaa19dd037f6fcb9ff5c3d2f879910aacf4b61cfc12fb0d01e130a667adefcbefe05a12faba608735dc4ab204fd920e56d47600f1cac0b6d536a7cd7f7c29a0bddb40e72c12939ada344a1cb5dc31a8e5420c233588c29efea72bda1b2eaf1c8a64e5088cc5ae77683f6e24f2ddedf927f2d011c6ec5a7841c1a7263ba4be8681aa72008848e4039c9af4076072366e4acb79f10ace564e0d21a83ec9e424f5a88c3db3ef2867a63f283911ab1ea16df192ba1581c84990755585090780e55886c7023b3ea49ff30b62154bed896cc734fd7cc29c21cd0901d2f0b7acecd9344bd05881ae0bb88870cb40c0167185f4558cfc825147639732829fc14baa577e01a6499e4ac5ee772240fc1f6e472f9b9cb67dcb51976afc4c54b3e704a64cef5f247f2a2e40661e3d4ea80ffa4cbfcdb46cf1e751d45be7245ab22037dade888e72246509cd473e316ad4b2e42e6f74342d6d2f06da28f7c6ed18d88305285f8a0783a952fe65a3f987d18043bbb1e83f699e48d531198a5a76bfa204117365247b89c3b004c7a653cba3ab63a4a689fc0bee0de3f41ad57eb5db2c03547b03f2ad3fa051ee98561fb2a17353ad557ebe7185282b193007849bd5ea8880b92f97b496c08eac1567b434471140a7695ffaf06861af6b1b8c8a48ddb9646f6be7a91571f8896aab584b90233986f9f08abfd8bf9aa93f3d2781ae5c056510e7807d97138988bcdbb2d8dcd96d395681b4f8a4ca476d6c4dfa4bea722d527011b4d3898f53e03e87afb3c7a7a9cce0b15e1742bb6a3439fe6f74ff5809d25fe9f95a91d0a7af74e920ee81e288b5d2559635034e8f46dafc05a5897eabf97d013b1e4d0a71af75a5c8ed89bf11511410d45340237fbc4d0c66842a2e382d3386a1c89a7c980235b94e67a428c39f971fc93a9b7c7a8e70bb9cddfa9823288d4464653cf21a1f778ef40ac8d2910835fd6145fed07428138c97fe4b8cbda102c9dfe3a37912edda909846f2c0c7c77579e02168c55dace82556295c5a83b5fe2deb0a6cf1f1aa936fb8277e4f3e2c9bdeb6b322077cc6e0b9b979f3cfec1daaef9817fc8bafc310e57d50babf0723067ed91238ac9452d14c51075de5e1ed1fae087bfadf08eb0c5f595c603660b6be3845b14f4c2c75ad478881a37f5496a614fc2f6fc36a75edc16f3bb4c06e7b57543f85561421ef130b1ba38e422d320c50573c7ea2985434521f45a1a9ecf329199ef29c195b091971f21ca071c4b79d046ff8d26a52c0226c49b52d392885ec003b0dba81cd6d5e1ddda91ac5609e7e20ad3c5e008548d6afec07b2ad7d5197017992d36cf9f4486f55e222a1569730948868c9a822738eb7861fcfcbd07953ea094981ec4f430765ea0e0595c5d83adb9e5baa2b7662748f7822cd07be275c882af7f97ad5e5c469ed6d02aa5393a89ed063f2c2586a5f37d96c1b66239a7328ad0a9d24b7c8f317691825a44887dd36158da9f83b41673900854e6f2688577fa9f9e35c8f740698eaa13a1a9bd022a5e15b2248d69721069319a4dc054d8631d3d4ee0a6da9b315421d97b9267e63d8d1d699e09cddcac5e4f77cfb7b84b4c048fb07c50f05a22e9d0ab7cffb5c05ddec2882f0f99990c824bac34a3da469fc1cb2b43c9f8cbf91e0490d370c886fe65bccdd623142567f0b5e8ba27a32f41455b18bed466045db5476865da7fa53d31fc79c441b6e9a105cdea234f26ba704e7c88c4965707ff43bb04e08f80400f4b3a3c61aef85fd56cc8f37c9355cf8041539d825bae61e106d73bbf0304b6bc1ed67e913994d74b973b64094b3899109e4cf3366eb6cf7f73624f9d9082663530c5184af1291588c5e5cd9ec6cbd01bd577d5307a52366bd625cdfd12524b6438915ebd40622e3bebf68f1794636aed85803639e0fb750db8087e891fab03c1f48cf609dcd7d8f3065fddd9fdd2dfd3cea09832d326d2a1bcc42dd5ee99a32bd3b43da10b11b65fb8bfe401885b9944b8e3c75ae65a7e1184ac83917e1e3b8652b8c751eb28c4e2fcc94097bb263ddae6bb2e1fe51454d722299a1b8d487824b51d45323427ab26420f61f7251d014f1c5bce0f84d35df8d2cfd4f66eb906f17fdba33df0a87dcc8a969ea778de5053b016e2594874da2dbffe6549768b37da641743a5d6e91950b181f213842c84ce453c0d4e308e1bcc99b9657962be31e1972ad7856d979237d1705f0c9525b116c9d8d3dd3f319f6439b64f19ec5a799a01902a9c96919b3dfdf2f649df981ade03a828fc0baca8cd12cc213440cefd57f3b4ac6bc096fee2a489bee0b2b6ed9ea2ae6f41765c195f8498aa12527ba6312c99402be6f9aa62ba11bb103e6401adbb61f9f6a84b8b44f9dc518dce9a85e76a7b0854b4587ad7531eea43f6567148c3a1a96e3c765a1914c644e30fa163bae8504927ddc1c0a32699f951d3d8948cb46599a6229e5a9506fd8c51acf56ad001a47acda92defe0447f0478d0a548c8cc9b1f7d36bca19bd11b7a0f600fccb6008dfd056d6decdae3a8a88cfc95cc8d357cc6280bdb36cea819e7dc833959b6cacf005ef51a3f118a83dca4a01d2e806e2fff7ddc7586e5f2e650ee9ce5250c40f63a72c59f16fc3d2d22e27fabeabaed9f22864b0872920539a2095e965429b482496290d2e83ff886c56c6ce9df8b94f6fb1b1290067254f4175f6318fc1e53bae9606a8be4df45522770de32878bb901d9ba7e2d657098880edd6289d83a3f1a1f3a58c687774b88e3e5f129780b7790a4f940295632dfc1a7f9fefa1875d5c9ab764615696068e2a032c5df75226b80832c5eb0638d77447fd7eb76f46840e21694c7e8ee1354fb0f04bd464a13b3d8ff6128274f648cc81072870c3bab8193fcfa95fb9f9e6521b32535addab3612e9dd229b2450ef48db435d564ba819a7abf0a5fb70188de1a011ce98478761298ce8532531301e15f8a3b6db71eae5c015de0165a42117c818dc9bced38d513334f72f7afbcc6faa266997da7864ed22144f96f54592424074d2625d3649965c1c079f0bcaf71f96e00381a9ecb66a67c7c68a2b4c7d7e2a3f0bc75242fb5e72798289209f01e85947c03db47cc892be39e605c095b53739ec1ee658d57dbd268162ad70193aa437cbd34b4ee717bc0240c75804f1c0abc9ea26ab0dc98cb14450b11d25f64fdf912f502be7c10a1cbbbbc7a15f9231d9f3264ae4bed14bfda3ad8bed0433de7efa678cdaf332da48ecc2db3b992fe9283671c06c908550f4d2b022970f014b464ba04b2c69968c303ba567ba3ea656ba8fddf880e79f16ee73420e198aa5c18765a7bbe0254548a2a9d5677b312335780e5d85ae0b67fdb396b7e84acc7e6132ce690fdd9899339531048bcd0d48aa07f933f532f3a24bbcb985950d49613014e0bd3c06f8f8a3f586610b5842fce3a05c602a045492f298695ea58de399acabe43928d91aa2070bc21aa6db7a9062d3ba886ebbfc602ba284e69d968deab609d25a82074b9b70c6e2bdab70dcf418c2108e91a1e846a1662cb3f1f0596b160fec3ee1583aceaec75fda575adb72eba501093d3354607d9a395762a977b79cb959e0fd728142753d9e975318567ba8960c39c69f7174ea53533c57ded1fc5ce642b611b00e17e3ac8e8a1483eda508d9704ecda924bcbd44396d6a52c0767eca018c5bb0f02d232510dc8e8da86bda103756f28f44c68185319fe7e9ef286c02f91685f672c52017f365614804c565b34e01bd6aba44d0467f0e2627f15d38f2e23d914c7d9bbcf368a92a917d61ee11b4f18cd54d805acc826fb43189731bf998001705753f77b2ae48600a3204b175c4c1d5f7aca8f43b40b94a20d747ff0dfa231f4833614e4eb7d47d92dc202cf67ea5bddf3d9531cce2e95cb63ad413afa314103b8d9fb1082ef23e1d3dd6e9414ef706339a362d2140e16378f9dc5b45ecc247f2b01cf23cd3205d233e2defd5a677c75548ff009cbf0145c431901fe061df8414878930ec931a955bd091a725d169621e799ac927fd40a73a7a3d859a09c079b46b2ed97800000fcae5f24f71f04b711a823c2bc6d39bc992c186ead577c430e6c21f0f6e480dda8119d950a374ba83167bc2baf2c715fc71494f0bb0549a2e260046740bebe6c964cd4818c7cfdbbe78eb948a2f3577c3b4363fe954b970d2b11b952203a1eaeae555bfeb2a561dae226d73f20d6a97922c89943780dfd49e6d90e03e253fcb875769814ef940f05513eb7f1e07d34ce1c6f40c340cb4bbabb5d8e08bb82eee429fb31d74700fcd1864cd7f381b67d48022b7e982ce7a77d121d6a241ef3ce7bdde095cb015cd5a7d4353dcbf772371b6ea0df536c130287f13f1b9c5e2596a7121b84a53306ef3806d5b28f05ca0850aeec7e7a09464b2c19ced28622901559a83ad66e286a346f4cd14e9c813d062a9868281aba952edbef25df87ac95e26b4200e691cf60f3e63a25aac7362aa9febab7d75c0935a856b912e5f6f487cdc99ea1751287cff214352e3bd8bae79563989db4b1219542b8caea60fb99a0cc3046b20114f21ababff17789d1a54a388d4da0ec1c2e540dc1421e78d8ae673cbdf96f2ef4785829c3e58b26126bd3465f279b5a1743136d13cd3afa87286b1fddd5f28e21ee9fe4190f83532ac0e27e21fcc12ce170c7026d38ea44531e764c7dfb327685f478f4f6e7dc9cade81a9860894260969ab39eda3b1a5a12a764ba003930b3aecb466ed07bca92286a7ccb620acf6ccf9f6447e2f0d0d0d301f4fdfa347c4b028ef8c6ae65bd21b49a30b65ce936008abcf48eb39a5ea07259c332d86e8b4715752211a4306f25d9539caa3ebe5b02d497dd69453ea2c8b99077c3ffbbc3d259b91fcbca4e52cf7866d89241614289ceb313d79d5af81bc368bae89201e7b2abd0365c5460febd1d58c36d656c5f10ae7c7e5db91c136870b62617d09edb45e6436a0c3f28fe4a28052fc703d29e5fe9f9c1fb0c33e9e266d11a4fdcac0c1cd68440df54a286839d8a7fd74b2139e1237d759d0f3ab8d57364ef912c8748bfef86d2a1f49410297529c7ef6f469475ee93e1b2dbdff5d08f01d4d31de71167502aa9b8f008e30c3a9fdc32d66f79f3f46a07011a2e09d35dbb4950e55d3c96a3c09c45de2fd8d462998f3d0015a31477fa3675d8bbdfe140b868ac844d7ef101d7929c62f8d81aa7e480dea1893deeb33877ba02d34bfb740eea33cc5a330045eb8715702af131ce83a8d872dc2a3ddba0044bd58910d8f2087c323a7c37a0b228f783247ea9849d007ee5810a3a027d40ff023b7a307659b34b3eaf6642f0e01f605497eec6ea9eab6024d29876374f2bebc0b5520ef53ebfd2e955a547b0d7a9fbd6302a6fc29d4e767dd87a50cd4e7bc6f99a3f03721d4e46b02e0d225ed33e28359e76b49a8acd9d7cdedd6364ee439493e4031ce8d7dc6675e8ce6588fe46bda59866f6183c5248240aa93128aa6397cd762af37a2495bfba08c8fdabe2945e2000ad8124a430397", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 12:39:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x402}, 0x28) 12:39:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x402}, 0x28) 12:39:34 executing program 5: 12:39:34 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:34 executing program 3: poll(&(0x7f0000000040), 0x2057, 0x4d) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x2a80, 0x0, 0x0, 0x800e00506) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/14, 0xe}, {0x0}, {0x0}], 0x3) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000000100), 0x8) shutdown(r3, 0x0) shutdown(r0, 0x0) 12:39:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') recvmmsg(r0, &(0x7f0000000680)=[{{&(0x7f0000000040)=@isdn, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/117, 0x75}, {&(0x7f0000000140)}, {&(0x7f0000000200)=""/95, 0x5f}, {&(0x7f0000000280)=""/195, 0xc3}, {&(0x7f0000000380)=""/112, 0x70}], 0x5, &(0x7f0000000180)=""/54, 0x36}, 0x63}, {{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/87, 0x57}], 0x3, &(0x7f00000005c0)=""/145, 0x91}, 0x6}], 0x2, 0x2103, &(0x7f0000000700)) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x8, 0x4, 0x1ff, 0x1, 0x6}) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x402}, 0x28) 12:39:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000b00)=[{&(0x7f0000000340)=""/38, 0x26}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001780)=""/4096, 0x1000}, {0x0, 0xa9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x40042) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r5, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001500)=[{0x0}, {0x0}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x3}, 0x0) shutdown(r4, 0x0) shutdown(r1, 0x0) [ 1661.241868] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x402}, 0x28) 12:39:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000040)) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) 12:39:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000080)="b9ff0302190d61", 0x0, 0x402}, 0x28) 12:39:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x402}, 0x28) 12:39:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000080)="b9ff0302190d61", 0x0, 0x402}, 0x28) 12:39:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x6f) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:34 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000080)="b9ff0302190d61", 0x0, 0x402}, 0x28) [ 1661.668701] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:35 executing program 3: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 12:39:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x8, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0xfff}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x44000}, 0x8000) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x8, 0x0, &(0x7f0000000080)="b9ff0302190d618c", 0x0, 0x402}, 0x28) 12:39:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a0", 0x0, 0x402}, 0x28) 12:39:35 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r1, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_mreq(r3, 0x0, 0x23, 0x0, 0x0) write$P9_RLOPEN(r1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 12:39:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a0", 0x0, 0x402}, 0x28) [ 1662.286235] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1662.302086] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1662.316482] attempt to access beyond end of device [ 1662.340341] loop3: rw=12288, want=8200, limit=20 [ 1662.360961] attempt to access beyond end of device 12:39:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a0", 0x0, 0x402}, 0x28) 12:39:35 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x2000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) recvmmsg(r0, &(0x7f0000006a40), 0x0, 0x2, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_cache\x00') ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="0500000000000600000000000000000000000000eacc000001000000000000006afaffffffffffffffffffffffffffff09000000000000000000000000000000000000000000000002000000000000000000000000000000e3e5ea0372e0e30357e6675ba897d8a9e4f74f081d63146b10ab1863fa00199df255e5dc2e081a8a0139f26f34a4f6e8183fb8ddbdf43169a718e99f0332aa3f58dc6f06f3ed4d071faf487ff6955769ea61418b42a19d4200aaf131fc2e8d0847c65f423eee23bfac4467ff4aac8e13f6b8ea607daccd333aa3db00"/222]) ioctl$FICLONE(r2, 0x40049409, r0) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 1662.382511] loop3: rw=12288, want=12296, limit=20 [ 1662.398147] F2FS-fs (loop3): Failed to get valid F2FS checkpoint 12:39:35 executing program 5: r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) symlink(&(0x7f0000001000)='./file0\x00', 0x0) msync(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0) 12:39:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4", 0x0, 0x402}, 0x28) 12:39:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) [ 1662.485227] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1662.500734] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1662.540885] attempt to access beyond end of device [ 1662.569474] loop3: rw=12288, want=8200, limit=20 [ 1662.604080] attempt to access beyond end of device [ 1662.609064] loop3: rw=12288, want=12296, limit=20 [ 1662.625480] F2FS-fs (loop3): Failed to get valid F2FS checkpoint 12:39:35 executing program 3: mkdir(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) munlockall() ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000200)=0xc) ptrace$poke(0x5, r2, &(0x7f0000000240), 0x8) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fcc00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) dup2(r0, r1) ftruncate(0xffffffffffffffff, 0x0) 12:39:35 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:35 executing program 5: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@broadcast, @local, @random="e133a48483df"]}) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x8, 0x0, &(0x7f0000000080)="b9ff0302190d618c", 0x0, 0x402}, 0x28) 12:39:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4", 0x0, 0x402}, 0x28) [ 1662.653829] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x12000, 0x40) mkdirat(r0, &(0x7f0000001600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000500)=""/147, &(0x7f0000000000)=0x93) rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') renameat(r0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r1, 0x0, 0x6, &(0x7f0000000180)=':bdev\x00'}, 0x30) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r2, 0x0, 0xa, &(0x7f0000000280)='security#\x00', 0xffffffffffffffff}, 0x30) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f00000005c0)='net/dev\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) 12:39:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4", 0x0, 0x402}, 0x28) [ 1662.747050] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 12:39:35 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x950, 0x82) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/mls\x00', 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000300)={0x7, 0x33, 0x2}, 0x7) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r3 = add_key$user(&(0x7f0000000700)='user\x00', 0x0, &(0x7f0000000780)="a1046ff416b43a90ae962e0521797ebe7af073f247efecb685340797aa114d59840febce47fb4568a9ef60ceec6ba1a0785814c40e8170c66cbb5831a4f14c268feae2aefb1a9881414cfcc4863eeb97fc270d8c0ad3e99c1676ec141c2fd10c7704fcddba411fd849d9e19d0f1898a5568d15e944c91f51b7520f611b83c08c8c97012c4e97c806f3c64d06403a", 0x8e, 0xfffffffffffffff9) keyctl$get_security(0x11, r3, &(0x7f0000001880)=""/4096, 0x1000) sendfile(r2, r1, 0x0, 0x10000) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/enforce\x00', 0x14000, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r4, 0x29, 0xd3, &(0x7f0000000480)={{0xa, 0x4e21, 0x0, @local, 0x81}, {0xa, 0x4e22, 0x200, @mcast2, 0x4}, 0x4, [0xfc6, 0x10001, 0x0, 0x8, 0x200, 0x0, 0x5]}, 0x5c) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)=0x9) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$TCGETA(r0, 0x5405, 0x0) execveat(r2, &(0x7f0000000000)='./file0\x00', &(0x7f0000000500)=[&(0x7f0000000180)='\x00', &(0x7f0000000240)=':\x00', &(0x7f0000000380)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', &(0x7f00000003c0)=').\x00', &(0x7f0000000400)='lo!proc(\x00'], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x1000, 0x100) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) clock_nanosleep(0x0, 0x1, &(0x7f0000000540)={r5, r6+30000000}, &(0x7f0000000580)) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) poll(&(0x7f0000000000), 0x1ffffffffffffd7d, 0xfffffffffffffe00) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_GET_VERSION(r7, 0x8004552d, &(0x7f0000000680)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x10) ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, &(0x7f0000001840)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 12:39:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0}, 0x28) 12:39:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 12:39:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0}, 0x28) 12:39:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0xa00}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000300)) r2 = dup2(r0, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r2, &(0x7f0000000040)="d892b1a39e1be009b3a7cf764154c0114a5ec90a85f6b30dd553a95e3fe8cd92cc25870c0cbebd27d28efd269769f414d466e3892d80b46e5057b8e3a149d63087860c11e28cc93e"}, 0x10) 12:39:36 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0}, 0x28) 12:39:36 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDMKTONE(r0, 0x4b30, 0x81) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCGPTPEER(r1, 0x540b, 0x9) 12:39:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x8001, 0x81, 0x9ff, 0x37, 0x0, 0x10001, 0x20, 0x1, 0x7, 0x40, 0x20000, 0x19, 0x0, 0x1, 0x6, 0x8000, 0xdd3, 0x4, 0x1, 0x625, 0x2, 0x97, 0x27a2, 0x100000000, 0xa1dd, 0x1, 0xfffffffffffffffc, 0x6, 0x6, 0xfff, 0x947, 0x3ff, 0x8d4, 0x1, 0x7f4, 0x7fff, 0x0, 0x4, 0x0, @perf_config_ext={0x6, 0x7fffffff}, 0x1010, 0x4, 0x2, 0xb, 0x3, 0x5, 0x4}, r1, 0xe, r0, 0xf0c0acb0955a5bed) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x10000, 0x0) 12:39:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x8, 0x0, &(0x7f0000000080)="b9ff0302190d618c", 0x0, 0x402}, 0x28) [ 1663.079556] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:36 executing program 5: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b70200000300b4eb884af8e252d30000f8feffff79a4f0ff0000000100000001000000ff2d6405000000000065040400010000000304000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000400000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7c290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3b0958da425dac602e0048bec11e874602f926a6d0d8da95ff88199bd2a85ae281993bfa213923bb755c1f1abd1964079158e09257ffc8a967b4c8fab00"/265], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/150, 0x96}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000380)=""/173, 0xad}], 0x3) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f00000004c0)=0x4) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000680), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x200000, 0x0) open(&(0x7f00000006c0)='./file0\x00', 0x0, 0x12) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x41) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:36 executing program 1: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffeffffffff2bf) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:36 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x80) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) madvise(&(0x7f00000b1000/0x2000)=nil, 0x2000, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) madvise(&(0x7f00000a2000/0x600000)=nil, 0x600000, 0x12) 12:39:36 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@l2, &(0x7f0000000080)=0x80) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@local, @multicast2, 0x0, 0x6, [@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @empty, @dev={0xac, 0x14, 0x14, 0x27}, @multicast1, @loopback]}, 0x28) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000001840)={'broute\x00', 0x0, 0x3, 0xb8, [], 0x6, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000700)=""/184}, &(0x7f0000000180)=0x78) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000018c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000019c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x440000}, 0xc, &(0x7f0000001980)={&(0x7f0000001900)={0x68, r1, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x200}, @NBD_ATTR_SOCKETS={0x3c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4040081) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000200)=""/143, 0x8f}, {&(0x7f0000000140)=""/27, 0x1b}, {&(0x7f00000002c0)=""/185, 0xb9}, {&(0x7f0000000640)=""/25, 0x19}, {&(0x7f0000000380)=""/29, 0x5}, {&(0x7f0000000600)=""/43, 0x2b}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000000400)=""/76, 0x4c}, {&(0x7f0000000480)=""/174, 0xae}], 0x1000000000000148, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 12:39:36 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) socketpair$unix(0x1, 0x3a98df55bc382c72, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000140)="e4b2a7b754c069cd83febae13710438bc947f998bdebec7be4b59634d5d6079449b2cea7dcdf5d3ba0512372bfe3beb4b81302dfac8e725d08131bdb33d011b4c6d18188dbf4ddb745fb53680b79c78a2ff7ff9e6030b71e074e3a1a6963294ce138251acdf2a7a1766ae08e06679d1395dfab5ff21ddcc3d6cc8ce0b6acd174cc59c12858ad63e4c0acf1db3492ad256b6b2cd62dd884ad7c20b99cc98a458f288659f262755c78215d02e5b6fed9c3d35662bc075096cca30743ee04fc355a10fe3f95ab25", 0xc6, 0x8880, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x65}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r0, 0x3f, 0x1) getpriority(0x1, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x7) r3 = gettid() tkill(r3, 0x24) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0xbb4) [ 1663.282136] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 12:39:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) pipe2$9p(&(0x7f0000000180), 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r0, 0x400000000000001) r1 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet(r1, &(0x7f0000000040), &(0x7f0000000100)=0x10, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 12:39:36 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x40c8810, r1, 0x0) 12:39:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d746196e5bd5c12fbbeb616f41755fcbed1307d89524429adc542c0200000012aac70000000a000000000000"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a0009000000000400000000000000000000002100000000000100000000000002000100010000000000000200fd000005000500000000000a004872bbb6896209000055781309e339be593f7710aa000001ff0100410000"], 0x70}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x3ef, 0x0) 12:39:36 executing program 1: seccomp(0x1, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x0, 0x7, 0x6, 0x80000001}, {0x100000001, 0x7758, 0xd70a, 0x1f}, {0x4, 0x9, 0xffffffff}, {0x8, 0x0, 0xfffffffffffffffe}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000200)='n\xf4tes\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\xb3\xc3/\x91\x1f\x12\x10\x19v\xad2\xbdY\xab\xb0[\xe3\x9c\xe8\\\xdf\x8eC\xa4\x136p\x81\x82@\xb1\x8ada3\x89X\xb6\xc3\xce\x17\xf3\xa7n3\xf8\xfc\xe8$^i\xae\xb2_\xcdPK\x9f\xb6\x18\x02\xdex\xa5\xf8\x17\xf1\x11\xc3\x1a\xdf\xbbU5z+\x8dVO\f\xd4\x8b@\xfe\xab\x8a\xd3\xe1\x11\xa5\x1e\xb0\x8b$r\x85}\xea0xffffffffffffffff}) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x40c8810, r1, 0x0) 12:39:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='\x03et/fib_t\xca\xd5\xbb4E\x9d[\xf5') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 12:39:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xc, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04f", 0x0, 0x402}, 0x28) 12:39:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40000, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000100)={0xd, 0x8001, 0x7}) 12:39:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) preadv(r0, &(0x7f0000000100), 0x466, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8000000007c98) munlockall() 12:39:36 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) sendto$inet(r0, 0x0, 0xffffffffffffffae, 0x0, &(0x7f0000000000), 0xfffffffffffffec3) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000001c0)=""/118) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x14110100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r3, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x100, 0x100000000}, {0x8, 0x9}], r1}, 0x18, 0x2) 12:39:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xc, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04f", 0x0, 0x402}, 0x28) 12:39:36 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x40, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0xff}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x1}}, 0xe8) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', 0x0, 0x0, 0x2) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x800) setsockopt$inet_udp_int(r2, 0x11, 0x0, &(0x7f0000000080), 0x4) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0xffd8) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) [ 1663.933306] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:36 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0xa400295c) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ff5000/0x8000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)="6b941b52cc794c7f288b64a6c04aa9a3eea1645c93090f4d876cc7827e66abd87b0ebc75db4bcd186a897fcb58c358645c8850d4d6de46cc34575468ba484d741ffdab04f5acaeb18be879c5baae84bde0a5b22eb01f0ad8f0c201cc661a2788221805970e61203a3c04cdd0ac022ae160afc0cbdcac1f675984b7df850a1619f48b8e6e16b37e4af71f011704bd592b4156b6d3f5965b65656c3c31da23cc64e334f260f820a8429c960d50589a7ae757f0fb80207a56836a37e4", 0xbb, r2}, 0x68) preadv(r3, &(0x7f00000017c0), 0x199, 0x0) 12:39:37 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x127000, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="03fd003c6e2c22e5000000"], 0x28}}, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r0, r3, 0x0, 0x800000000024) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r3, 0x0, 0xfd, 0x42, &(0x7f0000000340)="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", &(0x7f0000000140)=""/66, 0x101}, 0x28) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x3ff) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:39:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x9, 0x1}, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x1, 0x716, 0x5}, &(0x7f0000000280)=0xcbe7, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0xffff}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) r2 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) r4 = getuid() r5 = getgid() r6 = getuid() accept$inet6(r0, &(0x7f00000005c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000600)=0x1c) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = geteuid() getgroups(0x2, &(0x7f0000000480)=[0x0, 0xee01]) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000200)="6b0e8cd3bc18e6a2a103108bd8cceefaa51b67323332a952556c9517e19466fa8b91699b7f3844e30a2e5b2507d827e34e6c9a49deb3295bdff5d6d3523c9213be9db082fd5e8a3a0b8f5153ad31f80528ec514cb11a801fb4448d51d6800ed06c64c4478ca2d4b1c6ee98f66c2d15b756d717fd317760623ab7595c86dba2454886e7deec88acc0d05dc4d1dae217c164aba8c952fa3bcf67139d9d9d346c5fd88017c67a2c401cbf2ce5a275aa442e66a364bb63b0f311ec6d921ef51783ab4c421cf771c421f84b2f7dd491ae7610c05b8d66b81cd4940d5b7c0049df", 0xde}], 0x1, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r4, r5}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r1, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r1, r8, r9}}}], 0x98, 0x80}, 0x10) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x5, &(0x7f0000000040)=""/204) 12:39:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xa, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x1000000000000) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000140)=ANY=[@ANYBLOB='system_u:object_r:m`n_t:s0 /usr/sbin/cups-browsed 00000000000000000009\x00'], 0x47) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000200)={'ipddp0\x00', 0xfe00000000000000}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000001c0)) [ 1664.221448] selinux_nlmsg_perm: 118 callbacks suppressed [ 1664.221461] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22708 comm=syz-executor.3 12:39:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='cpuseteth1cpusettrustedvmnet0\x00', 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000280)={r1, 0x15}, &(0x7f00000002c0)={'enc=', 'oaep', ' hash=', {'sha1_mb\x00'}}, &(0x7f0000000380)="ec092c83adb61f6188099f4125a6a3fcf19a5f7f35", &(0x7f00000003c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1664.278851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22708 comm=syz-executor.3 [ 1664.300402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22708 comm=syz-executor.3 12:39:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000040)=""/28, 0xfffffffffffffe09}]}, 0xfffffffffffffffc}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 1664.324425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22708 comm=syz-executor.3 [ 1664.346218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22708 comm=syz-executor.3 [ 1664.376463] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22708 comm=syz-executor.3 12:39:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') [ 1664.432048] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22708 comm=syz-executor.3 [ 1664.459374] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22708 comm=syz-executor.3 [ 1664.492476] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22708 comm=syz-executor.3 12:39:37 executing program 5: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x70, 0xff, 0xffffffffffff6bde, 0x8, 0x5, 0x0, 0x9, 0x4, 0x1, 0x8001, 0x400, 0x3, 0x100000000, 0x1, 0x0, 0x9, 0x9, 0x100, 0xfff, 0x200000, 0x3, 0x7fffffff, 0x9, 0x6, 0x3, 0x40, 0x2, 0x3, 0xff, 0x1ff, 0x9, 0x30e, 0x4, 0x1, 0x3a0d, 0x5, 0x8, 0x0, 0x100000000, 0x6, @perf_bp={&(0x7f0000000000), 0x2}, 0x4002, 0x3, 0x101, 0x7, 0x7, 0x5, 0xc95}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x3, r1}) setpgid(r1, r1) syz_emit_ethernet(0x59, &(0x7f0000000040)={@local, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, '2', "045f57c1558db6d32be480de10f22e34a1c5966e49e0ba633794038b1f03e6e9ec975a342874963c7d6f31e6ae3f26d5c6366ea359ed4bc9f0a06066f0bf091c840333cf4ea3b5ca"}}}}}, 0x0) [ 1664.534268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22708 comm=syz-executor.3 12:39:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1664.613867] nla_parse: 1 callbacks suppressed [ 1664.613953] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:39:37 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:37 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000100)={0x22, 0xf, 0x4, 0x1e, 0x9, 0x100000001, 0x0, 0x15c, 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x406) 12:39:37 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007e58880e80900006d20002b1f00c0e9130a4a51f10101c7033500f0", 0x26) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000000240), 0x4) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f00000060c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) vmsplice(r0, &(0x7f0000000280)=[{&(0x7f0000000040)="8518c6244ff2f96fa615bf6f70d9da524c4291f25a015fe8058003f41399fa1b82df01898274572978b1e23b3bae47b00208891d817b3ed8f527797b0184ddfc45f559406b34862c67d8932552bd8e32361ceaa7e1725908d919aebe808d5cd4c9a9cc656e4f1fd70994750091b4fba5bb3ff0bcea635c1a5a90634e8567a33a2ea1bf92e36e211ab427b15934bce33080f032c5380a2b0848288905f0a47ede0d354dd5c0a194212e566c623f391e1ebb677815a59985a6d9d3dc19f76c9f8392d8cd3f66948578656e6a5adb4566908d6c07581d6004906cff070c3092b1ae405827e818d2056c14b07dea774d0602f8008046190fefda4e1e8800", 0xfc}, {&(0x7f0000000140)="ce1c1148f86dd1c134787fbb67593e33ad5672639014f0525f", 0x19}, {&(0x7f0000000180)="dcf4730ca9a0f0f75c24aff0de60308edcadb017e19fcc9c64a528aa1f1d", 0x1e}, {&(0x7f00000001c0)="0b2c150e1e7c9865115a8f218c0695620a4f1c726eb639ffdb32735d793892abc002118607a97f6be5d4152efb460546a63b5d51fe529e7645f1d4d45af7468e4fe91a177281aaa8d9", 0x49}], 0x4, 0x2) 12:39:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x2, r1}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/35, 0x23}, {&(0x7f0000000040)=""/72, 0x48}], 0x2, 0x0) 12:39:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x803102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="28000000320001830000000066f3069a08f8e3ab14000100100001000800010000000000c3000000c9614be54eb7f66879dee9fe1519c0c4c73aa85760801c76f00677c58b8c13f6d77b4461361deab89298a0aa4136fcfc750bdabda0380268b3aeff4a4125b04b6200282992b7c541d1"], 0x28}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000d8b000/0x2000)=nil, &(0x7f0000f80000/0x1000)=nil, &(0x7f0000fcc000/0x2000)=nil, &(0x7f0000d57000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000f25000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, &(0x7f0000caa000/0x3000)=nil, &(0x7f0000d4f000/0x3000)=nil, &(0x7f00000001c0)="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", 0x1000, r1}, 0x68) ioctl$sock_ifreq(r0, 0x891c, &(0x7f0000000040)={'netdevsim0\x00', @ifru_map}) [ 1664.689151] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x400000000) fcntl$setpipe(r2, 0x407, 0x4a0) splice(r1, 0x0, r2, 0x0, 0x55aa40be, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:wtmp_t:s0\x00', 0x1c, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) open(&(0x7f0000000100)='./file1\x00', 0x80000, 0x2) 12:39:37 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x185) perf_event_open(&(0x7f0000940000)={0x7, 0x1f2, 0xee6b, 0x0, 0xfffffffffffffffd, 0x3, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x100000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x8}}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x800000000, 0x0) r2 = gettid() capset(&(0x7f0000000240)={0x1998032e, r2}, &(0x7f0000000200)={0x0, 0x0, 0x2, 0xffffffffffffffff}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x3) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x8002, 0x0) r5 = dup(r1) setsockopt$inet6_opts(r5, 0x29, 0x37, &(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000d00)=ANY=[@ANYBLOB="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"]], 0x1) ioctl$RTC_AIE_OFF(r5, 0x7002) clone(0x20000, &(0x7f0000000780)="5a2fc8cc07d6bea8294ad6c5971d32afa50a0320d6d45a3824c5dbed8bd5bb845f24dff08c3c01463c6af6b8dfbb910ebb1c8bc1e5c63001599b44151e687af97cb2f022e01ecc4e5ebbdb1bfa0b2cd2c9ccbd15a06a642db8b66fc6ee2da74a805996262ca111a67f01b7fc848505590d648695bbd674717a1367634dd7c72268ba39b0433bda45b4e31820792a3470515d05351c48dd21d6791165c90de20ce974eb11f0457639e2af4d29d82676d447ab18d5", 0x0, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x7fff, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={0x0}, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r5, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) close(r4) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000001c0)={'t\x83am0 \x00', 0x1200}) r9 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) syslog(0x0, &(0x7f0000001a40)=""/4096, 0xcf9) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000002c0)={0x7, 0x7}) ioctl$EXT4_IOC_GROUP_ADD(r7, 0x40286608, &(0x7f0000000080)={0x5, 0x3, 0x7fff, 0x1, 0x7ff, 0xa2}) ioctl$BLKTRACESTOP(r5, 0x1275, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x8) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) ioctl$TUNSETTXFILTER(r8, 0x400454d1, &(0x7f0000000440)=ANY=[@ANYRESOCT=r6, @ANYBLOB="f683f9e13df3366ae723bfeaf3159f977392467c8d6a45762c6d767392b7a3e5b878b9a4a555f9c8c98e16cfd01fea5fb5878d6baa23605cbe20a9e68987fc4ec5ff9dd2fb139b3e55577597", @ANYRES32=r4, @ANYRESOCT=r0, @ANYRESHEX=r9]) [ 1664.754998] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1664.771676] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:39:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/41}, {&(0x7f0000000040)=""/253, 0x26d}, {&(0x7f0000000140)=""/19}, {&(0x7f0000000200)=""/181}, {&(0x7f0000000180)=""/40}, {&(0x7f00000002c0)=""/34}], 0xffffffffffffdef, 0x0) 12:39:37 executing program 5: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$packet(r0, &(0x7f00000000c0)="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", 0x1000, 0xd203ff829fe477b0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r0) set_robust_list(&(0x7f0000001100)={0x0, 0x8000}, 0x18) write$selinux_user(r0, &(0x7f00000010c0)={'system_u:object_r:fonts_cache_t:s0', 0x20, 'staff_u\x00'}, 0x2b) syz_read_part_table(0xfffffffffffff2a3, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="0200eeffffff01000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 12:39:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000000)={0x6, 0x8ef7}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 12:39:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'vboxnet1()ppp0\x00'}, &(0x7f0000000280)=""/175, 0xaf) 12:39:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:38 executing program 5: creat(&(0x7f00000000c0)='./bus\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)}, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x80010, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0xfffffffffffffd5a) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)}, 0x20) socketpair(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x624, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) lstat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000280)) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) 12:39:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000440)=0xe8) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x2, &(0x7f0000000280)=[{&(0x7f0000000080)="144b45675661c0933550b018d9b1946bdf11bd740768505ad62c045e1ac90e9acff68532997fcaefffa59b30ed0bc3b246543761a41c1d000947cf94f82b0402c105ee9808b4fcc4543c42932f130ec8d7c3eed9de307b99a9e115f6f0412557a7bc17c02b3a1d8947fe80a81f604174844a581f639347a34cb956a6fa8d5acdb1598bcfd90c7d4ca5f3022eb41cc60acae4665860550211c1eaeca06eac5bca9fbe51d14608b02b03bafcf47cb69521a11a4f82b008857f55da77ec955b4b41684c0cf33626d6a882e012338d60f905cf9b8044cf2ffb745134bf601ccbca2bc8ff3189120e656727929a012536871f", 0xf0, 0x5}, {&(0x7f0000000180)="5e4753355b01fd011826ddad4ac79b5450bbd3c80d128af1f474bf9888834dd285b42d9bdf95ae4242e2efd219026e216d2e6a395fda1a13ed1706f6f24c9cf8e8f3d9a971c9d923aef443c7ecd091ba2c3ba67ed910f01fa7058cc54108424fd28d1625f8a77a78c902e19473a852d9d081ee3ebc635c25b29ef54536a99215ef922c771f9f8b25052b7a6ec4a57bf19e4b4c82c1225b0eee735f4710949915474a8ec41f95a337ac8d9536c317e1174085b4cba2edf8651d3c448159ba9da65d573f4444545cd4e5ef2f14474b1b105bcbcd7adf3f8ae5c27ecb8ccf92d0a26fccbbbe5ba85c98ca", 0xe9, 0xffffffffffffffe1}], 0x2000, &(0x7f0000000480)={[{@bsddf='bsddf'}, {@sysvgroups='sysvgroups'}], [{@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r0}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@uid_lt={'uid<', r1}}]}) 12:39:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='vmnet0\x00', 0x7, 0x0) readlink(&(0x7f0000000140)='\x00', &(0x7f0000000280)=""/15, 0xf) 12:39:38 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) 12:39:38 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x164, r1, 0xd, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xdf}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x10}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x96f2}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x10}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xb, 0x20}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}]}, @IPVS_CMD_ATTR_DAEMON={0x74, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x28}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x77b}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netdevsim0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0xff) [ 1665.164758] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = dup3(r0, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8000000000008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x800, 0x0) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000680)=0x400100000001, 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x3f, 0x0, 0x230) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r3, 0x10000) ptrace$setopts(0x4206, r2, 0x0, 0x0) unshare(0x60000000) tkill(r2, 0x2c) fcntl$setstatus(r1, 0x4, 0x10000042802) 12:39:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000500)={0xa156, 0x9c, "a6a6dd70597c08db26ead5ede033f34bf41ca2c9d584223d2ffea93be657dbc0559cdbf9adaffc854c598671f7f5a92327deb5748215942e5c642a633d6c5963db13e0c37cfae61ae07bec265dcff362f750c4905d6a848c22f332a46c0f707b6e15f3937ac1229aabbce4134f0dda5404ad93d726ee5bd7e764a595d15830484f77da93bf5d152173756d9957961b099b65db0f1c4763cfe972786e"}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000700)={@empty, @loopback, 0x0}, &(0x7f0000000740)=0xc) getpeername$packet(r0, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000007c0)=0x14) r3 = getpid() ptrace$peekuser(0x3, r3, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000840)={0x0, @dev, @loopback}, &(0x7f0000000880)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000008c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000a40)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0xc08000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000900)=@mpls_getroute={0xf4, 0x1a, 0x210, 0x70bd2d, 0x25dfdbfe, {0x1c, 0x14, 0x80, 0x1000, 0xfc, 0x2, 0xfd, 0xa, 0x300}, [@RTA_TTL_PROPAGATE={0x8, 0x1a, 0x8}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x200, 0x100000000000000, r1}}, @RTA_OIF={0x8, 0x4, r2}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x7ff}, @RTA_VIA={0x14, 0x12, {0x10, "9f263e4e1232af2050aca59befb8"}}, @RTA_DST={0x8, 0x1, {0x2, 0x0, 0x8a14}}, @RTA_OIF={0x8, 0x4, r4}, @RTA_NEWDST={0x84, 0x13, [{0x7fff, 0x0, 0x80}, {0x3f, 0x0, 0x7ff}, {0x3, 0x0, 0xffffffffffffff77}, {0x3, 0x0, 0x8}, {0x3, 0x0, 0x401}, {0x0, 0x0, 0x8}, {0xeb0, 0x0, 0x8000}, {0x3e6, 0x0, 0x7}, {0x6, 0x0, 0x6}, {0x1}, {0x50, 0x0, 0x101}, {}, {0x6, 0x0, 0xfffffffffffffff8}, {0x400, 0x0, 0x9}, {0x1, 0x0, 0x6}, {0x2, 0x0, 0x8}, {0x620, 0x0, 0x2b}, {0x8, 0x0, 0x9}, {0x6, 0x0, 0x9}, {0x5, 0x0, 0x18000000000}, {0x3ff, 0x0, 0x6}, {0x5, 0x0, 0x5}, {0x3, 0x0, 0x3cc}, {0x2, 0x0, 0x474}, {0x49541079, 0x0, 0x5eb}, {0x6c, 0x0, 0x941}, {0x7, 0x0, 0xdf}, {0x4, 0x0, 0x8001}, {0x7, 0x0, 0x1}, {0xfffffffffffff001, 0x0, 0x7}, {0x0, 0x0, 0x35e0}, {0x200, 0x0, 0xb7}]}, @RTA_MULTIPATH={0xc, 0x9, {0xe8ee, 0xb5, 0x96b5, r5}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) preadv(r0, &(0x7f0000000600), 0x35b, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/241, 0xf1}, {&(0x7f0000000100)=""/183, 0xb7}, {&(0x7f0000000a80)=""/207, 0xcf}, {&(0x7f0000000300)=""/128, 0x80}, {&(0x7f0000000680)=""/89, 0x59}, {&(0x7f0000000400)=""/111, 0x6f}], 0x6, 0x0) 12:39:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x101000, 0x0) 12:39:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') dup3(r0, r0, 0x80000) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/38}, {&(0x7f00000001c0)=""/202}, {&(0x7f0000000840)=""/4096, 0x396}], 0x28a, 0xfffffffffffffffd) 12:39:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x80000000) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) fsync(r0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x10001) 12:39:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffdac}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0xfffffffffffffffe, 0x0, 0x40000000000000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000400)={0x3, 0xffffffffffffffe0, 0x9}) r2 = fcntl$getown(r0, 0x9) get_robust_list(r2, &(0x7f0000000280)=&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f00000002c0)=0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000640)=0x20000000) 12:39:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:38 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000140)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000380)={0x0, 0x0, 0x6, 0x0, 0x0, [{}, {}, {}, {}, {}, {r1, 0x0, 0x8}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xaaaaaaaaaaaacb3, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x10b, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) 12:39:38 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:38 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@llc, &(0x7f0000000080)=0x80) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2044}, 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="5db1e401e53e90721defb70384c149fa15d32c95dbf2066aabe5ea50f75ff566d1472e01f5cca8aca7cd28b873082ddf805b38bf17a140016ecb1a1d621edb6f44439042c1c93279b090f3776218186e2cb91d08383f6d751b5a56a09003683db0f843a043cd73", @ANYRES16=r1, @ANYBLOB="010c2abd7000fbdbdf250f000000180007000c000400eae80000000000000800010002000000240009000800020007000000080002000200000008000200ffffff7f08000200ff07000034000900080002000200000008000100090000000800020008000000080001000800000008000200010000000800020001000000"], 0x84}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r2 = gettid() fcntl$setown(r0, 0x8, r2) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') r4 = getpid() setsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000400)="be11650fa87ee8a29d9410d320890c2cc2a08f95cd39d091de24fa708f052e3ddcde7758a09fba2dcce15bcb1b4e41f90b17b7af8aaa708d2ea7c7dccddb21f6302a8e791550842ccae81647d53905647ddc2a73fa33a01cfd982f7f99468764be1898d9074e01a1e2424fdd9c0ebf557ad70e31d30a7ab5da4c877c7d29bd8ad4a67c71eb4a5a09582e9e487677a69892919c8a4f9604e2afbafc7b5fdcbec2074aee93f3853fa190afe0f071eb15aebd23fa03fa69b31f0ccb4b36bb1ea9b8ff69ca97b51685ed8c560d0a70040c5e1122b47af6795667456e28c92031f72c7818a7892a6c309e", 0xe8) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f00000003c0)=r4) preadv(r3, &(0x7f00000017c0), 0x199, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x69, "699aa68239639a423d16953d22008c8ac3a486254c2346507c709ed88fd5ebc0864eafa5b3dbd528ff87378fe89f23e214d1753a29bcc9de912aa6c423bfbd090e3f074402447e328aa50a0a60fda79ba62c24404f7df302e2a2bbb1cba27a480e21bc3a347ecde699"}, &(0x7f0000000380)=0x8d) [ 1665.840767] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x100, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000002900)=""/4096) 12:39:38 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xac) r1 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)}, 0x5}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = getuid() getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) fchownat(r2, &(0x7f0000000000)='./file0\x00', r3, r4, 0x1000) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x2f7) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x8) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) [ 1666.014665] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1666.038455] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1666.077403] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 12:39:39 executing program 3: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x571d2f42142c0101) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r5) [ 1666.123682] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 12:39:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() sendmsg$sock(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="a0326c296f8bca2b279dd880cbdf7a38b037037e0fa6fdd243138ce2a0440e5ddc9bfca77f7e94d877edfb78b25fa60a167281aae7040858f124b945c8f1ce9294642b45830d1aa2e2bf58f609d2fa23279791e7fd4568141ee6ce2924a652503dbd67b2f0daeda967332d9532e18f20", 0x70}], 0x1}, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="000000004c938ffbcbaa0d4444088e3c0fd954c2e47c04c900000000fbffff1347f0f76d36f61fc0119dc9375b52ffffff14ddbc71"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0x1f6}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="4e13473b89fbc45c3c476c0937d1f72e54cff2ab3e002db95212b9", @ANYBLOB="afabe794fb8e7584e626469620602b523baf8406cb1af9c32be46a916a7baf4ddc659c55d60b1a7a72af979e30fd0baaac5b48410d94d9e2e6294e6ab4214e5e4b6ab619c17ab56f830db60a34ff3eb117f7c8e5e33ea5"], 0x0, 0x79}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 12:39:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x2, 0x7, 0x2, 0xfffffffffffffff7}) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40020000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="40010000", @ANYRES16=r2, @ANYBLOB="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"], 0x140}, 0x1, 0x0, 0x0, 0xc0}, 0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000000c0)=@generic={0x3, 0x8001}) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x8) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) [ 1666.238897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:39:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x3) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x8010, &(0x7f0000000340)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303033322c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030322c6d6f64653d30303030303030303030303030303030303030303030322c6d6f64653d30303030303030303030303032303030303030303030302c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c656f64653d30303030303030303030303030303030303030313737372c6d6f64653d30303030303030303030303030303030303130303030302c6673757569643d66653332773a7f3d2d7e3739312d313700762d003532612d6237357f763962662c005fe7dbcad97ab5d82b96fcb1fd4825c7285be2d077b65e753dd3d13df83416929031b41aafcde50e1fd7955b68c31f6daaca132d167daebab87dc7070771c46e10732fee2d51a2565b43245572c61296e566e26747da564db15a5ad6fe4aa869e24e70716e6bfa0cc69a60fb9bb233d08de9f4a3859ac124d1b591840ddde901ba7b0348ba338cd2ee67e62623"]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 12:39:39 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = getuid() ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x38, 0x37, 0x2, 0x17, 0x6, 0x5, 0x6, 0xcd}) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) keyctl$join(0x1, &(0x7f00000002c0)={'syz', 0x2}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='big_key\x00tM\xe2\x8f/A\xc3\x94n\x83\xcb\xc3\xa1\xa3>\x17\xa3\x1c\xb3\x1b\xd7[\xcafxF\x13\xa9\xda\xd4Fd[%\x16a:|!\xf3\x1b\r#', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000180)='#\x00', 0xfffffffffffffffe) 12:39:39 executing program 5: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b40)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000000c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000fc0)=0xe8) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000007c0)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000001000)={@mcast1, 0x0}, &(0x7f0000001040)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001080)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000001180)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000011c0)={'teql0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001200)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000001300)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000001340)={@broadcast, @dev, 0x0}, &(0x7f0000001380)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001400)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000001600)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002700)={0x0, @empty, @dev}, &(0x7f0000000800)=0xffffffffffffffac) accept4$packet(0xffffffffffffffff, &(0x7f0000002780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000027c0)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004a80)={0x0, @rand_addr, @local}, &(0x7f0000000840)=0xc) r16 = syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000a40)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x20080}, 0xc, &(0x7f00000009c0)={&(0x7f0000000900)={0xa4, r16, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffc}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3d}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xe66}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) getpeername$packet(0xffffffffffffffff, &(0x7f0000004c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004c40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004d00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004d80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004dc0)={0x11, 0x0, 0x0}, &(0x7f0000004e00)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000005400)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2002000}, 0xc, &(0x7f00000053c0)={&(0x7f0000004e40)={0x550, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x188, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xdb}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x7, 0x5, 0x3, 0x1f}, {0x101, 0x88fb}, {0x9, 0x9, 0x5, 0x8}, {0x7d82, 0x2, 0x4, 0x1}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0x128, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x6, 0x3ff, 0x9, 0x7fffffff}, {0x6, 0x0, 0x7, 0xb5}, {0x2, 0x10001, 0x2, 0x1}, {0x1a1e0000000, 0x2, 0x200, 0x7f}, {0xc3e, 0x1, 0x7, 0x4}, {0x2c, 0xae, 0x8, 0x4}, {0x2, 0xc82f, 0x7, 0x800}, {0x3, 0x2, 0x10001, 0x5}]}}}]}}, {{0x8, 0x1, r10}, {0x134, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x99}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x138, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffff}}, {0x8, 0x6, r20}}}]}}]}, 0x550}, 0x1, 0x0, 0x0, 0x800}, 0x800) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f00000000c0)=[{&(0x7f0000000100)="9b0000003804000019001900e601000aa300000000efffff0000000001000000004000000040000080000000000000006d5ebe5a0000ffff53efe98a1fabdd6cc99b2275554cd4592600fb0c56b75783c41e283bb11f9c707b8ab543f6", 0x5d, 0x400}], 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/policy\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x9, 0x6, &(0x7f0000000480)=[{&(0x7f00000001c0)="cc37d6e71fa2d2493f335047d3d763e4d80ba930b4cae5836abb", 0x1a, 0x740055b3}, {&(0x7f0000000200)="93b38da316802cb3f8a2b3994d3e811cfc040f01487e3ed11d9c8580087d8deaee439b", 0x23, 0x3}, {&(0x7f0000000240)="7c89c8d889ce09bc3a6b39250740bfc1cb42a80fade72a2d9b4eb42947625c8e7f964b303ee0a8a0fb5a26d6dccd864525bc2cbcd7d35cadf174435e6a17d1a05a5c34cd8940bbf4ee53488794844c7687d42730c57a6f0645d9ae6c3a29b032153c113330033b7ddc9d852354d42906d5513ac7da8e0dcc0b52cbbc338420f8c5245c7992c912b6750959", 0x8b, 0x101}, {&(0x7f0000000300)="c61b9b6b10f248a5522888f7e2ed3f0a7b01a3b6da4cc72b9f4b19b6b643efd31cbf2fa8d02e16e1aeec8f2742f05056b18e42274c82fb3dca20efc745f3121cac73500885f239c70d1a5ef4fa40f3adcad00664231020495fccc2a52255aaaa0653fceb6e39c2c5a6e43f0a06ac091051f3f4d26c8238cbeba4f84cf8e7c0f326c2949487cba5a7298e2f11ce381bc84f445a6aa4314d7f0ae785a9001b9d59d25c4abd5ef568a0a5a67684c7fb839cb3a26caf14a8a6602370e43cfc0a42a8ae0cda4ee7b884a25e4c7684c49e2541b09baf2fba5d8e67cdbaab8418fa568e7e01db1a9c9058a68889905c370cb9d1c0c510f629864a", 0xf7, 0x4}, {&(0x7f0000000400)="a62b32df5ca1b140b467e376d6cbd2ead0b7dc0a60c6", 0x16, 0x46f}, {&(0x7f0000000440)="b0", 0x1, 0x80000001}], 0x2000000, &(0x7f0000000540)=ANY=[@ANYBLOB='init_htable,journal_patl=./fcle0,au\bo_da_alloc=0x0000000000000007,\x00']) r21 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/enforce\x00', 0x4000, 0x0) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_SET(r23, 0x4008700c, 0x1af8) linkat(r21, &(0x7f0000000600)='./file0\x00', r22, &(0x7f0000000680)='./file0/file0\x00', 0x1000) [ 1666.904082] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 1666.929858] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 12:39:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0}, 0x28) 12:39:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='limits\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}}], 0x1, 0x102, &(0x7f0000000980)={0x0, 0x1c9c380}) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) fsync(r0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) [ 1666.963288] EXT4-fs (loop5): #blocks per group too big: 16384 [ 1667.058883] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 1667.074318] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1667.094080] EXT4-fs (loop5): #blocks per group too big: 16384 12:39:40 executing program 1: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x1c, 0xfe7f8575711bf31e) recvmmsg(r0, &(0x7f0000006a40), 0x1, 0xfffffffffffffffe, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000640)='ne\xb3\xb7p\xf5(yp3\xe5@\t\x9c\xd5t/fib_triestM\x80\x0f\xea\xff\x8d\xdd\xfdkt\x00!.L\x97\x11\xf41\x97\xd0\t\xaa\xb2\xb53\xa1M;\xa4\x92{\xfa\a\x8a\xb1\xe3& \x87\xfb\xf1\xda\xaeJ\b\x1d+\rXF\xca\x1a_\x8a\xe9\xa3\x8a\xd9\xce\xcd\x91g,\xde\b(\x85\xc4\xd9+\xe9\xfcI\xc3;\xe2)\"e\xf1y)\x80') preadv(r1, &(0x7f0000000500)=[{&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000040)=""/65, 0x41}, {&(0x7f00000000c0)=""/193, 0xc1}, {&(0x7f0000000200)=""/234, 0x38}, {&(0x7f0000000300)=""/221, 0x4ab}, {&(0x7f0000000400)=""/228, 0xe4}], 0x6, 0x0) 12:39:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a00f0fff8ffffff79a4f0ff00000000b70600ffffffffff2d6405000000000065040400010000000404000001077d60b7030000080000006a0a000200000000000000002b000000b700000000e3000095000000001000000d7a28683a4102e4aeb50f366306000000341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b913b828a34e6bdc4dc1af6d3c6958da46601c602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281913bfa213923bb755c1f1abd1010000008fabe27b2121a5f03dff2c97b1f651dab4058bb1008931ed22d30f2cd601e75a24dabe2ab4f36be839d1902d86fe85c6a37f670479ab361a7efe5aa6e3e78513a20fc9dda440d6efa4391b50e46a8f94ddc141b765"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:40 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:40 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x13, 0x7ffffffff, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000180)="6a08da0b", 0x4) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x41) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x9, 0x2, 0x7, 0x1, 0x0, 0x6, 0x25621, 0x8, 0x4, 0x5, 0x100, 0x9, 0xd4bc, 0x5, 0x6b44, 0xcdf3, 0x3, 0x1, 0x6, 0x3, 0x6, 0x9, 0x0, 0x1, 0x5, 0x6, 0xff, 0x5, 0x8, 0x10000, 0xe93, 0x0, 0x0, 0x80000001, 0x35dc3c01, 0x5c, 0x0, 0x3, 0x1, @perf_config_ext={0x1, 0x9}, 0x20400, 0x6, 0x7fff, 0x8, 0x6, 0x1}, r2, 0x5, r1, 0x2) sendto$inet6(r1, &(0x7f00000003c0)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e225e412a93ffde44006284418dcd9bc1875e6f8c0810e8824591f3064f53560d549cc59f64f7771c5e006e116015eee9913669ccaabee5f0ce3dc19bad70307", 0x100b1, 0x0, 0x0, 0xfffffffffffffed2) gettid() lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'system.', 'wlan0((cgroupcpuset^*!\x00'}, &(0x7f00000001c0)='selinuxem1cpuset$\x00', 0x12, 0x2) dup3(r0, r1, 0x0) 12:39:40 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) fcntl$setstatus(r1, 0x4, 0x2400) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0x0) getgroups(0x0, 0x0) getegid() getsockname$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f00000006c0)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f00000002c0)=0x596, 0x4) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) 12:39:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') sendto$unix(r0, &(0x7f0000000000)="b07be535fb719da5ab597c7c1cd698f09bfa2dfb29fc4b3ebabb8e810f003cc92704ef91e5ce66a2c4ee4f362f333fa65e16faea94e4b2936f6ac36058773de2e560447d6f7299224fc0454ff066d6e2a99c63b446cefe0b2fa1fd65fdf5d763d251b322acf732712ee9c69cc7efabdf24dd3f", 0x73, 0x40001, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) getpeername$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x6}, [@alu={0x7, 0x40, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x95b}, @jmp={0x5, 0xffffffffffffff7f, 0x1, 0x4, 0xb, 0x10, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0xaf, 0x0, 0x0, 0x0, 0x67f}, @jmp={0x5, 0x80000000, 0x0, 0xb, 0x9, 0x4, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x59, 0xc9, &(0x7f0000000200)=""/201, 0x41100, 0x4, [], r1, 0x15, r0, 0x8, &(0x7f0000000300)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xd, 0x66, 0x8001}, 0x10}, 0x70) 12:39:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x0, r1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/vga_arbiter\x00', 0x1, 0x0) r2 = open$dir(&(0x7f0000000f00)='./file0\x00', 0x40000, 0x100) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000400, 0x104) write$P9_RFLUSH(r3, &(0x7f00000003c0)={0x7, 0x6d, 0x2}, 0x7) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000540)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000900)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() getgroups(0x2, &(0x7f0000000b80)=[0xee00, 0xffffffffffffffff]) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() r17 = getegid() fsetxattr$system_posix_acl(r0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000dc0)={{}, {0x1, 0x5}, [{0x2, 0x7, r4}, {0x2, 0x1, r5}, {0x2, 0x4, r6}, {0x2, 0x6, r7}, {0x2, 0x1, r8}], {0x4, 0x7}, [{0x8, 0x1, r9}, {0x8, 0x7, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r12}, {0x8, 0x0, r13}, {0x8, 0x2, r14}, {0x8, 0x3, r15}, {0x8, 0x4, r16}, {0x8, 0x4, r17}], {0x10, 0x7}, {0x20, 0x7}}, 0x94, 0x3) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f0000000e80)) r18 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x49000920}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="001439ce7e118a96af8c2d85fc5ede869b50541bf67d8fe672455ad91f874ab2f7654de6ef8253b399a7c48133eac94be410638a04e789d55dd87a777c27e1cccdd59245f7d394b662dd6712c13f3632af79a41c0eba292778e0ed46bd5b3d6b637fe0c08e057c35375d61e3e31e2766002840328859710962e05427481a809b1d091e0627bdcc2735af5b0574e8dfcc51449386e509dcad5e4af1ea0bda06ad32e737268d908f36f616640daa3f6156", @ANYRES16=r18, @ANYBLOB="08002cbd7000fddbdf250d000000200001000c00070010000000100000000800080005000000080006006e71000024000300080007004e2200000800080003000000080004009eaf0000080007004e240000"], 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x810) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000b82000)={0x10000004}) ioctl(r0, 0x1000, &(0x7f0000000140)="a7b554372dec1c03a7c796d0dd60823dbf73930ff7c1102ad67ca9091cfc40e1d5c6b2df41451cec102cbcc92e77e8ea5d10580a4798308b30c1e52c37cb87c1ddfffbcf9442d4dbeb9fd575868bd4cffff9489b33330f65610e33a41c564f") sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r3, &(0x7f0000000080)=[{}], 0x1, 0x7fff) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 12:39:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x140002}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0xffffffffffffff96, 0x13, 0x2000020, 0x70bd26, 0x25dfdbfd, {0x12}}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0xc000) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:40 executing program 3: r0 = socket(0x100000000011, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00'}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x410980, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="04b600005457056454a54630370522ffe444353dd54312cd251f29fa710c181c0eac3c2865c3f2287d3620adf418efa4044606a585afdce54a2bb0ea266d8e89727e649b70108e339ee9977a2916a2877e51de8d2d4707f6b8cfd9dc01802dd6a1aa3aac2e55b287", @ANYRES16=r1, @ANYBLOB="00082cbd7000fedbdf250d000000180001000c0007000200000010000000080004004e23000014000300080000000028000300140002007465616d5f736c6176655f3000000000080007004e230000080001000000000008000600090000000800060000000000140001000800020000000000080009004b00000008000600bc0009003e00000008000900240000001f000800f7000000080004000700"/178], 0xb8}, 0x1, 0x0, 0x0, 0x20044085}, 0x804) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) bind$packet(r0, &(0x7f00000004c0)={0x11, 0xc, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000140)={0x1}, 0x4) [ 1667.537452] device lo entered promiscuous mode [ 1667.624663] device lo left promiscuous mode [ 1667.649297] device lo entered promiscuous mode 12:39:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0}, 0x28) 12:39:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0xaa, &(0x7f0000001b80)=[{&(0x7f0000000000)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='attr/prev\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000400000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b652249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(r0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x100, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100)=@ccm_128={{0x304}, "cc54770bdd8aaff5", "c4d8493df7c522d4f3024a5e534e3f77", "5ee63ae3", "d035926fc24253b2"}, 0x28) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r2, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:40 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x229}}], 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/packet\x00') preadv(r1, &(0x7f00000017c0), 0x20b, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 12:39:40 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, &(0x7f0000000300)={0x0, 0xfb, 0x15, 0x0, 0x0, "c34ffdbf8a84f9d87a3764838973db46"}, 0x15, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r1, 0x0, 0x0) write$selinux_create(0xffffffffffffffff, 0x0, 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000080)='.\x00', 0xfe) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./file0\x00', 0x4000085) write$nbd(r3, &(0x7f0000000380)={0x67446698, 0x0, 0x0, 0x0, 0x0, "6517a42ac4cb7a63d1a97a7e5a31524e892eac4023b714a3202f99f16d06589e03469637a7267592938766010a35efd21affe2009efdc31a381587a5960ac2022d45136803a9e841e84f03d05ebc7e87c10dfc8b2cf1fd84d6cd3e51a59d7ec760979da5b0496692f91482ae3f1658c76f239a"}, 0x83) sendfile(r3, r3, &(0x7f0000000200), 0xa198) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000000c0)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x21) socket$packet(0x11, 0x0, 0x300) 12:39:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r1, &(0x7f0000000040), 0x0, 0x4000000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='syzkaller\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x1f) 12:39:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000000040)=""/35, 0x23}, {&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/148, 0x94}, {&(0x7f0000000140)}, {&(0x7f0000000200)=""/75, 0x4b}, {&(0x7f0000000180)}, {&(0x7f0000000280)=""/26, 0x1a}, {&(0x7f00000002c0)=""/32, 0x20}], 0x9, 0xfffffffffffffffb) prctl$PR_SET_UNALIGN(0x6, 0x1) [ 1668.167440] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='uid_map\x00') fchown(r0, 0x0, 0x0) fchown(r0, 0x0, 0x0) 12:39:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='task\x00') preadv(r1, &(0x7f0000000000), 0x2a9, 0x0) 12:39:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r2 = dup(r1) write$P9_RLCREATE(r2, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x80, 0x1, 0x8}, 0x2}}, 0x18) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x4, 0xb, &(0x7f00000002c0)=@raw=[@alu={0x0, 0xffffffffffffffff, 0x9, 0x3, 0xa, 0xfffffffffffffffc, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, @generic={0xb5, 0x1, 0x8, 0x50fd5afb, 0x401}, @jmp={0x5, 0x9, 0xc, 0x8, 0xa, 0xfc, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x6}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r2}], &(0x7f0000000380)='syzkaller\x00', 0x1000, 0x0, 0x0, 0x41f00, 0x1, [], r3, 0x16, r2, 0x8, &(0x7f0000000680)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000006c0)={0x0, 0x2, 0x6, 0x511}, 0x10}, 0x70) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) fsetxattr$security_smack_transmute(r2, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x1) 12:39:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) syz_genetlink_get_family_id$team(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000140)=""/7, 0x7) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@loopback}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000bc0)=@hci, 0x80, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002a80)={{{@in6=@remote, @in=@remote}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x88000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="09b8c01ee20a74c7e92a4d2e608927c3bee6b71091422a00d33087e85abed356ea813ad554b4f95324a3ec792b3b5faf1053daa73a85cfe57f16a25e6add3cc33f8d2c9f812c5a57133bbf9ae4f802163ec328a25f7fb8c7f2946eb768a698aac77a8341f33f24325b6d0ebb8cd5c264586c", @ANYRES16=r3, @ANYBLOB="00062dbd7000fbdbdf250e0000001400020004000400080001000400000004000400380001000c0002000800020000080000100001007564703a73797a32000000001800010069623a76657468305f746f5f6272696467650000"], 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x40) ioctl$LOOP_CLR_FD(r0, 0x4c01) close(r1) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000400)='net/mcfilter6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) 12:39:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0}, 0x28) 12:39:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f0000000640)=[{&(0x7f00000000c0)=""/172, 0xac}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f00000006c0)=""/230, 0xe6}, {&(0x7f0000000180)=""/57, 0x6}, {&(0x7f00000003c0)=""/163, 0xa3}, {&(0x7f0000000480)=""/202, 0xca}, {&(0x7f0000000580)=""/191, 0xbf}], 0x2, 0x0) 12:39:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:41 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:41 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "e56c31f9f3b441d3a4319715adb6891c"}, 0x11, 0x1) write$UHID_CREATE(r0, &(0x7f0000000100)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/16, 0x10}, 0x120) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0effaab0f4ff000000000000"], 0xc) [ 1668.764843] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x40, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xf63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x35}]}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 12:39:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) write$P9_RAUTH(r0, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x2, 0x1, 0x1000000000003}}, 0x7) 12:39:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e21, @rand_addr=0x1}, {0x306}, 0x4, {0x2, 0x4e22, @local}, 'team_slave_1\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000002c0)={0x3, 0xc6, 0x7, 0x8000, 0xc1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r2, 0x1, 0x3f, &(0x7f0000000140)=0x3d5, 0x4) 12:39:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/23) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:41 executing program 3: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:41 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/fib_triestat\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000000)) 12:39:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002a0, 0x9, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1668.918259] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:39:41 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@rand_addr="27a28c33e21e6d83ee781caa4b7ca9bf", @loopback, @loopback, 0x0, 0xfa3, 0x0, 0x100, 0x9, 0x402000d1, r1}) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x10000000000001ce}}], 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) close(r2) 12:39:41 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x7f}], 0x1, 0x0) 12:39:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'user.', 'net/fib_triestat\x00'}, &(0x7f0000000080)='net/fib_triestat\x00', 0x11, 0x2) 12:39:42 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x800) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000140)=""/61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1669.058752] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:39:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x0) 12:39:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x84800) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xa3, "18d34f1aff5bb1fac8201c0086c5c8ca7dc7a8c4d5c8c4459aed6c509ef635aeabe9eef6fe6ac2f1c6742cfdd48591990cd164f8bd48152d20ba196622eab2476b4c52cbdfc45f39830079f9e4814685f5991293df1710339b22b76f2d23f70df81cccfe4a202ec20ff25db6509fa7107f3991feb6291526a320873fa11a6afd7f13782f57bc81fbcd7f89b95701ee41730fcb2ba7746d3d62be0c44dbf42b5d2f8334"}, &(0x7f00000002c0)=0xc7) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, 0x0) write$P9_RLOPEN(r1, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0xc0}, 0x8}}, 0x18) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000100)=""/60, &(0x7f0000000180)=0x3c) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a", 0x59, 0x1a0}]) 12:39:42 executing program 5: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64448883684e8a7ab93200010005000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bdda8602e0048bec11e874602f925b6dbd2af21b75feaa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000000c0)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) sendfile(r0, r1, 0x0, 0x6) 12:39:42 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r2, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r4, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) 12:39:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50c5e0bcfe47bf070") recvmmsg(0xffffffffffffffff, &(0x7f0000005280)=[{{&(0x7f0000000280)=@ethernet={0x0, @local}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001680)=[{0x0}], 0x1}}], 0x2, 0x10100, 0x0) syz_emit_ethernet(0x1bd, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x58000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/267], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) write$P9_RAUTH(r0, &(0x7f0000000080)={0x14, 0x67, 0x2, {0x54, 0x1, 0x8}}, 0x14) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) setsockopt$sock_int(r1, 0x1, 0x13, &(0x7f0000000000)=0x7, 0x4) 12:39:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) getgroups(0x8, &(0x7f00000000c0)=[0xee01, 0xffffffffffffffff, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000300)=[r2, r3, r4, r5]) 12:39:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1669.787025] nla_parse: 1 callbacks suppressed [ 1669.787049] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 12:39:42 executing program 5: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000040)={0x100000001, 0x1, 0x5, 0xb004, 0x5f, 0x7, 0x8309, 0xc95a, 0x1, 0x7f, 0x6, 0xffffffffffff7fff, 0x4, 0x100000001, &(0x7f0000000000)=""/5, 0x400, 0x0, 0x5}) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) uname(&(0x7f00000000c0)=""/176) 12:39:42 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x3, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000180), 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000200)=0x1fe) sendmmsg$inet(r2, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001940)="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", 0x13b}], 0x1}}], 0x1, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000100)=""/78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') sendfile(r3, r4, 0x0, 0x88002) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) eventfd2(0x0, 0x1) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r1, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x1) 12:39:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x5}, {0x6, 0x0, 0x200}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80001, 0x0) r3 = getpid() ptrace$cont(0x7, r3, 0x9, 0x1ff) readlinkat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/142, 0x8e) [ 1669.967627] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 12:39:42 executing program 3: mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ff0000/0x1000)=nil) r0 = getpgid(0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(r0) fadvise64(r1, 0x0, 0x9, 0x1) syz_open_procfs(r0, &(0x7f0000000000)='net/rt6_stats\x00') 12:39:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'bridge_slave_1\x00', 0x0}) sendmsg$inet6(r0, &(0x7f0000000740)={&(0x7f0000000000)={0xa, 0x4e20, 0x6, @local, 0x4}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000040)="1611c657612501dca5d473d2b0f01f45edda0e3fe6ba88446aa18dcb9021c7841b36e7d3bb4daf82815ea939095ae27a5d313f6cee48862a1f2468a8c4bf363e84147ec4dbb303cf", 0x48}, {&(0x7f00000000c0)="839e4ab0ef5fb5be4753e7c136e5e7c37fa0bde875a43283eb19b6516d221f1d9b4fba36a30b", 0x26}, {&(0x7f0000000100)="43381aa5d3a3551c4b5c8114bfff8fdc30cbd5231353cc93a02f837f498f904764e06db4f743035fd3aa6653fb4e8c81e962ed583b503f8c7970710d4661508cd6bf", 0x42}, {&(0x7f0000000180)="5a68a858c44cbb8133670ed851", 0xd}, {&(0x7f0000000200)="2ab530b7082397fb3cf6686c05bea615da260802ae2e8c26edf71a5fea43d936ee76c38a2c1b41932fd126558363b77b2e600c49b7e6c9f10ab84e18718e0b1af90483ed21fd30b063ebd94f7693622d6601d1b17be49432b2287cbc0ccb32d038b4", 0x62}], 0x5, &(0x7f0000000840)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x6e8f}}, @dstopts_2292={{0x60, 0x29, 0x4, {0xbb, 0x8, [], [@pad1, @generic={0x2d0f, 0x29, "4a3556e2f8e048d39eab8f0e609b1818163e7c676f64264573afa3a79d83a71ef5ce0db08f00741e57"}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @local}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7fff}}, @rthdr_2292={{0x98, 0x29, 0x39, {0x67, 0x10, 0x0, 0x0, 0x0, [@rand_addr="3f152f54cc9cad83a06c2553d37f28ae", @mcast1, @ipv4={[], [], @multicast1}, @mcast1, @remote, @empty, @local, @empty]}}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr="11afe597cb7b13ba07d9e3074bbd3149", r1}}}, @dstopts_2292={{0xa8, 0x29, 0x4, {0x87, 0x11, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x4}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @pad1, @enc_lim={0x4, 0x1, 0x5}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x6, 0x54, "418ce97765d0faee7a4264c1d6f598edbc5b3e7eeb0eabdb0be37e85f3e8453e39a63e169cb331f13f5bfbad441de22479731f62bf50bb5e06f14cbc4e2aec6bb0143d6f37be4a2c3a2bb5e16bdcaff69fb5bc8b"}]}}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x2b, 0xe, 0x2, 0x8, 0x0, [@loopback, @rand_addr="81f2dd882a42e5e055f2204bce515b85", @empty, @loopback, @remote, @loopback, @ipv4={[], [], @multicast2}]}}}], 0x280}, 0x4000001) 12:39:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(r0, &(0x7f0000000280)=@isdn, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000500)={'icmp6\x00'}, &(0x7f0000000540)=0x1e) accept4(r1, 0x0, &(0x7f0000000580), 0x80000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x3, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000640)={0x1, 0x55, 0x100000000}) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x4000) setrlimit(0x0, &(0x7f00000005c0)={0x5, 0x10000}) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f0000000100)={0x9, 0x57, "78a20b67a8f7da374dfcb989c7fa734c4aadbf8c39cb8f1b754ef42d96e89ba343fdcf1059405c8c7b2feffa1615efacd516fd4db885d6758e895a97d483741d9b8f3ba275b4ee640ffcef494c2d375474c3637a310c3b"}) 12:39:43 executing program 3: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x330, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2ccd0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffffffffff70}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="00000100730007000000000000000000000010020000000002044b01fa36d7d1070fd0a1afd3"], 0x0, 0x26}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x8, 0x3) 12:39:43 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r2, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r4, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) 12:39:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000400)='net/fib_triestat\x00\x9f\xb0Y\x96:\xe0\x85\xf7bE\xab0P\xbd\xd5%\xffI!,?g\xcf`A{\xa1\x1c\xf83\x90\xdf\x96\xec\x8a0\x03\xad\x01\x91\xec;\x82\xaa\x13\x8a\x17YYOh\xeb\xbbK\xc7\xa3\xf5u\xcc\x15\x9c\xcc\x9eevPX3\xaa\xc1\x03\xbd\xb1b\xa1\xa3G\xd5\xfd\xbb\xb0DQ\xdft\xf0\x14:5P\x90\xb8\x19\xc9xZ\xf5\x1e;\xe8\xc9\x9c\xe7\x84\x99H\x99=1R\x9b\x98\xc7C\x1f\x9f\f\xcfD\x91\xf5\xe3\x0f\x9aw\x16\x8f\x93$\xa9g\v\xe5s0x0, 0x0, &(0x7f0000000040)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x1, 0x0, 0x6}, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0xffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r1, 0x10, &(0x7f0000000180)={&(0x7f0000000840)=""/4096, 0x1000, r2}}, 0x10) 12:39:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000280)={0x0, @remote, @dev}, &(0x7f00000002c0)=0xc) 12:39:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = geteuid() r3 = getuid() setresuid(r1, r2, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) getgid() setregid(0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socket$inet6(0xa, 0x5, 0x11) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, 0x0) r6 = dup(r0) ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000140)) r7 = getpgrp(0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xfb) syz_open_dev$loop(0x0, 0x0, 0x0) setresuid(r1, r3, 0xffffffffffffffff) r8 = geteuid() setreuid(r8, r8) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r7) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r4, &(0x7f0000000080)="f809de", 0x3, 0x57, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000540)={'security\x00'}, &(0x7f00000001c0)=0x54) 12:39:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:43 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r2 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x78, 0x0, &(0x7f0000000280)=[@release, @acquire_done, @free_buffer={0x40086303, r1}, @increfs_done={0x40106308, 0x3}, @acquire_done={0x40106309, 0x3}, @acquire={0x40046305, 0x2}, @free_buffer={0x40086303, r2}, @decrefs={0x40046307, 0x3}, @exit_looper, @acquire={0x40046305, 0x2}], 0x18, 0x0, &(0x7f0000000140)="0279f02eb1dc1b85f138556c02d48ab65df11fbf79da8417"}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) write$uinput_user_dev(r4, &(0x7f0000000900)={'syz1\x00', {0x100000001, 0x7fffffff, 0xc2, 0x1}, 0x37, [0x4, 0x100, 0x4, 0x2, 0x100, 0x0, 0x7fff, 0x80, 0x101, 0x4, 0x7, 0x1000, 0x7, 0x3, 0xfae6, 0xc7, 0x726b, 0x2, 0x20, 0x5, 0x3f, 0x9, 0x7, 0x20000, 0x0, 0x9, 0x4, 0x2, 0xe1e9, 0x9, 0x7, 0xa0a7, 0xf3, 0x1, 0x3, 0xd21, 0x9, 0x9, 0x8, 0xfff, 0x0, 0xdeb0, 0x5, 0xfd, 0x8b7, 0x80000000, 0x5, 0x8, 0x7, 0x4, 0x20, 0x4, 0x65, 0x2, 0x0, 0xaeac, 0x21b8, 0x6, 0x5, 0xfa, 0x4, 0x8, 0xffff, 0xbc], [0x7, 0x7, 0xfffffffffffffffc, 0x0, 0x1000, 0xfffffffffffff378, 0x6, 0x5, 0xc97, 0x7, 0x80000000, 0x600000000000000, 0x0, 0x80000000, 0x0, 0x1c, 0xb4f0, 0xfffffffffffeffff, 0x9, 0x7, 0x5, 0xb6ee, 0x8, 0x3, 0x80000000, 0x4, 0x1000, 0x10000, 0x10001, 0x1, 0x7, 0x3, 0x7, 0x100, 0x9, 0x1000, 0x2, 0x6, 0x3ff, 0x5, 0x1b8, 0x7, 0xde, 0x20, 0x4, 0x100, 0x8, 0x7fff, 0x3, 0x8, 0x6000000000000000, 0x7, 0x81, 0x8001, 0x3, 0x6, 0x4, 0x5, 0x10001, 0x8, 0x80, 0x9438, 0x3, 0x6], [0xe4af, 0x239d, 0x1, 0x9, 0x100000001, 0x81, 0xfffffffffffffff9, 0x80000001, 0x6, 0x9, 0x6, 0x80000000, 0x1, 0x1, 0x1, 0x5, 0x9, 0x100000001, 0x3, 0x1ff, 0x5, 0x570, 0x1, 0x7fffffff, 0x3c5, 0x3, 0x2, 0x0, 0xd2, 0x949, 0x8c, 0x4, 0x3, 0xfffffffffffffffc, 0x5, 0x7, 0x0, 0x5, 0xffff, 0x6, 0x16, 0x400, 0xff, 0x10000, 0x2, 0x3, 0x5, 0x20, 0x80, 0x6, 0x4, 0x6, 0x7, 0x100000000, 0xb220, 0x6, 0x8001, 0x0, 0x7ff, 0x6, 0x4, 0x0, 0x7f, 0xa057], [0x37031d07, 0x6, 0x8615, 0x7fff, 0x9, 0x31, 0x7, 0x3ff, 0x3, 0x6, 0x8, 0xc04, 0x1000, 0x8, 0x9, 0x1, 0x0, 0x907, 0x6, 0x7, 0x100, 0x4, 0x3, 0x8, 0x3, 0x4, 0x10001, 0x2, 0x1, 0x0, 0x0, 0xd8a, 0xfffffffffffffffe, 0x8, 0x7, 0x6, 0x2, 0x10000, 0x101, 0x8, 0x29de, 0x4b5c, 0x1, 0xffffffffffffff00, 0x214, 0x5, 0x3c, 0x3, 0x1, 0xffffffffffffcd53, 0x4, 0x1, 0xfff, 0x2, 0x7, 0x7, 0x6, 0x200, 0x401, 0x5, 0x8, 0x10001, 0x5, 0x3ff]}, 0x45c) 12:39:43 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000800)=""/28, 0xfffffffffffffcb8}], 0x1}}], 0x1, 0x200000, 0x0) fcntl$getown(r0, 0x9) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/f\x01\x00_triertat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=""/138}, {&(0x7f0000000180)=""/47}, {&(0x7f0000000140)=""/38}, {&(0x7f0000000500)=""/146}, {&(0x7f00000002c0)=""/179}, {&(0x7f0000000380)=""/234}], 0x10000000000000a8, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)) write$P9_RFSYNC(r0, &(0x7f0000000000)={0x7, 0x33, 0x2}, 0x7) 12:39:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40), 0x226, 0x40000100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = dup3(r0, r0, 0x80000) ioctl$BLKROSET(r2, 0x125d, &(0x7f00000000c0)=0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:46 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x21, &(0x7f0000000080)=0x200, 0xfffffffffffffc2b) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e20}, 0x10) r1 = request_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='.lo\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000000c0)="e3068724b9b405b98d9e3f7bc0ad56d2c5e77b318fd55537c271ed739c531b7b60474c1512b000868d5574de7497ed9a172bcc", 0x33, r1) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x400020fe) 12:39:46 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r2, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r4, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) 12:39:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/362], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000000c0)=0x5) write$binfmt_elf64(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="7f454c460307000109000000000000000300030005000000420000000000000040000000000000007a030000000000007a0c00008100380002000400d600070000000000c1ffffff0700000000000000080000000000000077164669000000008000000000000000000000000000000009000000000000003e733804a04a30c4a69bcef2c0bef28112c265e9984cf4e520c923ac4caeee6f7811614253b92257727187b9c1228ad0ecacc17700e8f689adbcb30dbac1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a2a4474eed3c66b500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c4393dcf1d"], 0x3b6) 12:39:46 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r2 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x78, 0x0, &(0x7f0000000280)=[@release, @acquire_done, @free_buffer={0x40086303, r1}, @increfs_done={0x40106308, 0x3}, @acquire_done={0x40106309, 0x3}, @acquire={0x40046305, 0x2}, @free_buffer={0x40086303, r2}, @decrefs={0x40046307, 0x3}, @exit_looper, @acquire={0x40046305, 0x2}], 0x18, 0x0, &(0x7f0000000140)="0279f02eb1dc1b85f138556c02d48ab65df11fbf79da8417"}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) write$uinput_user_dev(r4, &(0x7f0000000900)={'syz1\x00', {0x100000001, 0x7fffffff, 0xc2, 0x1}, 0x37, [0x4, 0x100, 0x4, 0x2, 0x100, 0x0, 0x7fff, 0x80, 0x101, 0x4, 0x7, 0x1000, 0x7, 0x3, 0xfae6, 0xc7, 0x726b, 0x2, 0x20, 0x5, 0x3f, 0x9, 0x7, 0x20000, 0x0, 0x9, 0x4, 0x2, 0xe1e9, 0x9, 0x7, 0xa0a7, 0xf3, 0x1, 0x3, 0xd21, 0x9, 0x9, 0x8, 0xfff, 0x0, 0xdeb0, 0x5, 0xfd, 0x8b7, 0x80000000, 0x5, 0x8, 0x7, 0x4, 0x20, 0x4, 0x65, 0x2, 0x0, 0xaeac, 0x21b8, 0x6, 0x5, 0xfa, 0x4, 0x8, 0xffff, 0xbc], [0x7, 0x7, 0xfffffffffffffffc, 0x0, 0x1000, 0xfffffffffffff378, 0x6, 0x5, 0xc97, 0x7, 0x80000000, 0x600000000000000, 0x0, 0x80000000, 0x0, 0x1c, 0xb4f0, 0xfffffffffffeffff, 0x9, 0x7, 0x5, 0xb6ee, 0x8, 0x3, 0x80000000, 0x4, 0x1000, 0x10000, 0x10001, 0x1, 0x7, 0x3, 0x7, 0x100, 0x9, 0x1000, 0x2, 0x6, 0x3ff, 0x5, 0x1b8, 0x7, 0xde, 0x20, 0x4, 0x100, 0x8, 0x7fff, 0x3, 0x8, 0x6000000000000000, 0x7, 0x81, 0x8001, 0x3, 0x6, 0x4, 0x5, 0x10001, 0x8, 0x80, 0x9438, 0x3, 0x6], [0xe4af, 0x239d, 0x1, 0x9, 0x100000001, 0x81, 0xfffffffffffffff9, 0x80000001, 0x6, 0x9, 0x6, 0x80000000, 0x1, 0x1, 0x1, 0x5, 0x9, 0x100000001, 0x3, 0x1ff, 0x5, 0x570, 0x1, 0x7fffffff, 0x3c5, 0x3, 0x2, 0x0, 0xd2, 0x949, 0x8c, 0x4, 0x3, 0xfffffffffffffffc, 0x5, 0x7, 0x0, 0x5, 0xffff, 0x6, 0x16, 0x400, 0xff, 0x10000, 0x2, 0x3, 0x5, 0x20, 0x80, 0x6, 0x4, 0x6, 0x7, 0x100000000, 0xb220, 0x6, 0x8001, 0x0, 0x7ff, 0x6, 0x4, 0x0, 0x7f, 0xa057], [0x37031d07, 0x6, 0x8615, 0x7fff, 0x9, 0x31, 0x7, 0x3ff, 0x3, 0x6, 0x8, 0xc04, 0x1000, 0x8, 0x9, 0x1, 0x0, 0x907, 0x6, 0x7, 0x100, 0x4, 0x3, 0x8, 0x3, 0x4, 0x10001, 0x2, 0x1, 0x0, 0x0, 0xd8a, 0xfffffffffffffffe, 0x8, 0x7, 0x6, 0x2, 0x10000, 0x101, 0x8, 0x29de, 0x4b5c, 0x1, 0xffffffffffffff00, 0x214, 0x5, 0x3c, 0x3, 0x1, 0xffffffffffffcd53, 0x4, 0x1, 0xfff, 0x2, 0x7, 0x7, 0x6, 0x200, 0x401, 0x5, 0x8, 0x10001, 0x5, 0x3ff]}, 0x45c) 12:39:46 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1, 0x0, 0x288}, 0xfffffffffffffffe}], 0x1, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100), 0x84000) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$TCXONC(r2, 0x540a, 0xfffffffffffffff7) 12:39:46 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000380)=@gcm_128={{0x303}, "74f9f8b34ef5681f", "afce73c4d854bdd802ddfea1f6cd0409", "ffd4b27f", "3affc0fda6e3d01b"}, 0x28) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x9, 0xf, 0x3, 0x11, "38c09cf26b0002eb77d7c3916b4d8ed14f5ab980f307b404f01c60946d23d599dadabfc5cd74c366abf5248e0f1b056e16b04c284a6aa0365744680c9617cf4a", "61265f5466a0590e3404f04d6b1de56b2834212292cecc773898e3df1063c9d9", [0x8, 0x3000]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x0, 0xd, 0xe2, &(0x7f0000000400)="27cacc1c7871f8eb4fa96ac60b", &(0x7f0000000440)=""/226, 0xfa}, 0x28) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_open_pts(r3, 0x20d00) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/\x04p_tables_ta|geas\x00') fstat(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f00000003c0)) setsockopt$inet_mreq(r3, 0x0, 0x27, &(0x7f00000007c0)={@multicast2, @broadcast}, 0x8) fchownat(r4, &(0x7f0000000040)='./file0\x00', r5, r6, 0x1800) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r7, 0x4) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x1c, &(0x7f00000001c0)=0xfffffffffffffffe, 0x4) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) sendto$inet6(r8, 0x0, 0xffffffffffffffd1, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x400000000004e22}, 0x1c) sendto$inet6(r8, &(0x7f0000000540)="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", 0x218, 0x8000, 0x0, 0xfffffffffffffc35) close(r8) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000240)) 12:39:46 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x400006, 0x0) ptrace$pokeuser(0x6, 0x0, 0x8f1b, 0x32) openat(0xffffffffffffff9c, 0x0, 0x1, 0x140) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000400)=0xc) getuid() stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000ec0)) getegid() getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) setpgid(0x0, r2) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x1f) ptrace(0x4217, r3) sched_getparam(r3, 0x0) ptrace$pokeuser(0x6, r3, 0x388, 0xffffffffffffffff) timer_getoverrun(0x0) syz_open_procfs(r3, &(0x7f00000003c0)='fd\x00') readv(r0, &(0x7f00000013c0)=[{&(0x7f00000000c0)=""/37, 0x25}], 0x1) 12:39:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000040)=@caif=@dbg, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/82, 0x52}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000000140)=""/62, 0x3e}], 0x3, &(0x7f0000000200)=""/132, 0x84}, 0xb2}, {{&(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000340)=""/226, 0xe2}], 0x1, &(0x7f0000000480)=""/233, 0xe9}, 0xaa}], 0x2, 0x10000, &(0x7f0000000600)={0x0, 0x1c9c380}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000640)={@remote, r1}, 0x14) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 1673.363149] audit: type=1400 audit(1565181586.292:205): avc: denied { setattr } for pid=23228 comm="syz-executor.1" path="socket:[138473]" dev="sockfs" ino=138473 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 12:39:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x0, 0x2}, 0x10) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1008010c}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="14010000cb548c90c76f7001ef06ca67c76865c07e2e3d5adf74f00a36f3f39d7e65935f0a5b1021243c00c5b1ec919eba3fa17d807f839d58726e103ce09ba4b52b15082c4133f9d353f3984bb4", @ANYRES16=r3, @ANYBLOB="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"], 0x114}, 0x1, 0x0, 0x0, 0x4000000}, 0x4080) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:46 executing program 1: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x9, 0x3, 0x3c8, 0x0, 0x0, 0x1e8, 0x1e8, 0x1e8, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, &(0x7f0000000040), {[{{@ip={@empty, @loopback, 0x0, 0x0, 'teql0\x00', 'gretap0\x00', {}, {}, 0x16, 0x3, 0x8}, 0x0, 0x180, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xc}}, @common=@unspec=@string={0xc0, 'string\x00', 0x1, {0xf7d, 0x401, 'bm\x00', "1964fc14ce74b20eb6aef7a7e3e95e5b8799dba9a6943e2ca7c35c4f02904fae7516cf183890031e0bc989e67bfeb8ebd449eeec18b4dac873b72a6f013605f2884c319b25fcecd2d2b9ff70817c4e070a178cb8c5ee85f9a7e087b281b775084c49adf70a9323981c6c529968f903a4f4a7963cd46e02533cc4a88ae8739bb7", 0x64, 0x2, 0x2}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x2, 0x7f, 0x8, 0x10000, 'snmp_trap\x00', 'syz0\x00', 0x4}}}, {{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x4, 0x6eddfb20, 0x5, 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x5062b1af0533392f}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local, 0xe762, 0x6, [0x16, 0x1a, 0x2e, 0x21, 0x1b, 0x34, 0x9, 0x15, 0x8, 0x28, 0x25, 0x3b, 0x1e, 0x13, 0x2, 0x40], 0x2, 0x5, 0x4}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x428) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x8000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x3ffffffc, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r1, &(0x7f00000003c0), 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000080)='veth1_to_bond\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 12:39:46 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x9, 0x0, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x0, 0x3}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/checkreqprot\x00', 0x40300, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=0xfffffffffffffffd, 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000340)) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e22, @multicast2}, 0xffffffffffffff90) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={0x750, {0x2, 0x0, @dev}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x82, 0x0, 0x0, 0x0, 0xffffffffffffffff}) sendmmsg(r4, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) listen(r1, 0x10001) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000200)) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) ioctl$KDDELIO(r0, 0x4b35, 0xd4) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) unshare(0x20400) socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007740), 0x0, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000040)=0x1) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syncfs(r5) mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000004) fsetxattr(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x1) sched_setaffinity(0x0, 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) 12:39:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000300)=0xc) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x9a69, 0x3c2, 0x6, 0x8, 0x0, 0x7, 0x2000, 0x3, 0x200, 0x0, 0xfffffffffffffff8, 0x101, 0xd3ff, 0x6, 0x9, 0x10001, 0x7, 0x4, 0x6, 0x2, 0x800, 0xffff, 0xa60, 0x2, 0xffffffffffff0000, 0x3, 0x9, 0xff, 0x7f, 0x3f, 0x4, 0x6, 0x80, 0xfffffffffffffff8, 0x3, 0x2, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000180)}, 0x80, 0x1, 0x7, 0x0, 0x7fffffff, 0xfffffffffffffffa}, r1, 0xb, r0, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') pwrite64(r0, &(0x7f0000000100)="8266fb3e01c84b9309da2843f36f5a6c14f68ab5e82f210f1f76ce894fbe1f6297966205f3ab128488d55f919d7307fdfcd52081891bd0946cfb58fd13350a30e1d94b1e38c483890549fc0dd42551f3dd26be083ae932369d32dac2", 0x5c, 0x0) preadv(r2, &(0x7f0000000100), 0x0, 0x0) flistxattr(r2, &(0x7f0000000000)=""/225, 0xe1) 12:39:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="36cd5ba23412ebfbb9ff0302190d61", 0x0, 0x402}, 0x28) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10, 0x80800) ioctl$sock_ifreq(r1, 0x8946, &(0x7f0000000140)={'teql0\x00', @ifru_addrs=@ipx={0x4, 0x1, 0x5, "2026bffdfd00", 0x807}}) 12:39:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) socketpair(0x1b, 0x4, 0x20, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x400000, 0x0) connect$inet(r4, &(0x7f00000006c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r5, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4}, 0x0, 0x0, &(0x7f0000000480)={0x2, 0x3, 0x7, 0x25f}, &(0x7f00000004c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r6, 0x10, &(0x7f0000000640)={&(0x7f0000000380)=""/242, 0xf2, r7}}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r8, &(0x7f0000000340)=""/39, 0x27, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r10 = dup2(r5, r8) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, 0x0, 0x0) ioctl$RNDADDENTROPY(r10, 0x40085203, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000770000009229b8785b08547965734b896a3ec3eded05c67b5b510f27800fdee2d5416c516cbd8e7e2657ceb1e929d0dbe5b4dd358ab59a4358302fa7121978def89dcf9655343f196777b4e73d53deb32e1eff56b5c176377a076dfacf48592a7b32e00bc3e938990a2ffcf7e7dc660e8995b060fc3ca490c15cf6"]) fchown(r3, r1, r2) r11 = syz_open_procfs(r0, &(0x7f0000000180)='net/ip_tables_targets\x00') preadv(r11, &(0x7f00000017c0), 0x199, 0x0) 12:39:46 executing program 5: memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x4, 0x3, [0x20000300, 0x0, 0x0, 0x20000dcc, 0x20001950], 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00 ']}, 0x7b) ptrace$setregs(0xf, r0, 0x0, &(0x7f00000002c0)="79303623b8") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) [ 1673.868274] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1673.900285] ip6_tunnel:  xmit: Local address not yet configured! [ 1673.913654] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1673.932211] ip6_tunnel:  xmit: Local address not yet configured! [ 1674.122464] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1674.160266] ip6_tunnel:  xmit: Local address not yet configured! 12:39:47 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x800, 0x0) prctl$PR_GET_SECUREBITS(0x1b) r1 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000300)='cgroup.type\x00', &(0x7f0000000380)) ioctl$RTC_UIE_ON(r0, 0x7003) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000480)={0x2a413510, 0x7}) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000400)={0x0, 0x3, {0x55, 0x40, 0x6, {0x3, 0x1}, {0x9, 0x45}, @period={0x5d, 0x70000000, 0x1, 0x2, 0x0, {0x4000000040000000, 0x3, 0x8001, 0x100}, 0x8, &(0x7f00000003c0)=[0x3eb, 0xfd, 0xfffffffffffffff9, 0x4, 0x4, 0x5, 0x1f, 0x6000000000000000]}}, {0x54, 0x3, 0x3ff, {0x18, 0x6}, {0xffff, 0x4}, @const={0x8, {0x23a96df2, 0x6, 0x109, 0x8}}}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x18000000000002a0, 0x5a, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0xffff}, 0xfffffffffffffea6) 12:39:47 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000340)=0x3f, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000280)='gy\x02@\x00\x00\x00\x00\x00\x00\xc2\xf51\fsWs}\xca\x87\'L\xff\x00\f\x13\x9eE%]\xce\x10\xc1\xec\xda\xd6\xf9\b\xc0B\x96T:\x18\x9c\xc7\x96\x15\xbe15\xcd\xa1m\x85k\x94\xa26\b\x00\x00\x00\x00\x00\x00\x00\'\xfd\x98f\x1e\xbc2]\xdf', 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0x20000000000000}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x81, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:39:47 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x200000, 0x100) write(r0, &(0x7f0000000180)="1ac5596340b6e6cce776f1a876094da125f2dfe27617ddac25589018a32881bbe19125914c7e9ae33e4503197aabec1000e64943e85bb57dafe092c0bcc66893e63844a3c05d469d060a3eda7e18e0caabf43349fb93e97923c956a6a2b9", 0x5e) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/ptype\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 12:39:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) socketpair(0x1b, 0x4, 0x20, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x400000, 0x0) connect$inet(r4, &(0x7f00000006c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r5, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4}, 0x0, 0x0, &(0x7f0000000480)={0x2, 0x3, 0x7, 0x25f}, &(0x7f00000004c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r6, 0x10, &(0x7f0000000640)={&(0x7f0000000380)=""/242, 0xf2, r7}}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r8, &(0x7f0000000340)=""/39, 0x27, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r10 = dup2(r5, r8) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, 0x0, 0x0) ioctl$RNDADDENTROPY(r10, 0x40085203, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000770000009229b8785b08547965734b896a3ec3eded05c67b5b510f27800fdee2d5416c516cbd8e7e2657ceb1e929d0dbe5b4dd358ab59a4358302fa7121978def89dcf9655343f196777b4e73d53deb32e1eff56b5c176377a076dfacf48592a7b32e00bc3e938990a2ffcf7e7dc660e8995b060fc3ca490c15cf6"]) fchown(r3, r1, r2) r11 = syz_open_procfs(r0, &(0x7f0000000180)='net/ip_tables_targets\x00') preadv(r11, &(0x7f00000017c0), 0x199, 0x0) 12:39:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000140)="77b8") perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:47 executing program 1: r0 = dup(0xffffffffffffffff) write$P9_RLCREATE(r0, &(0x7f0000000000)={0x18, 0xf, 0x2, {{0x40, 0x2, 0x1}, 0x6}}, 0x18) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 12:39:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x1) r2 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000140)=0x80) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x4402, 0x40) r4 = socket(0x5, 0x80000, 0x8) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x60}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x4c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xa76}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r1}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1674.335664] device lo left promiscuous mode [ 1674.355090] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 12:39:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x18d, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 12:39:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) socketpair(0x1b, 0x4, 0x20, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x400000, 0x0) connect$inet(r4, &(0x7f00000006c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r5, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4}, 0x0, 0x0, &(0x7f0000000480)={0x2, 0x3, 0x7, 0x25f}, &(0x7f00000004c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r6, 0x10, &(0x7f0000000640)={&(0x7f0000000380)=""/242, 0xf2, r7}}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r8, &(0x7f0000000340)=""/39, 0x27, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r10 = dup2(r5, r8) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, 0x0, 0x0) ioctl$RNDADDENTROPY(r10, 0x40085203, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000770000009229b8785b08547965734b896a3ec3eded05c67b5b510f27800fdee2d5416c516cbd8e7e2657ceb1e929d0dbe5b4dd358ab59a4358302fa7121978def89dcf9655343f196777b4e73d53deb32e1eff56b5c176377a076dfacf48592a7b32e00bc3e938990a2ffcf7e7dc660e8995b060fc3ca490c15cf6"]) fchown(r3, r1, r2) r11 = syz_open_procfs(r0, &(0x7f0000000180)='net/ip_tables_targets\x00') preadv(r11, &(0x7f00000017c0), 0x199, 0x0) 12:39:47 executing program 1: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) recvmmsg(r0, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 1674.509950] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fchdir(r0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x4603000000000000]}}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') open(&(0x7f0000000240)='./file0\x00', 0x80200, 0x60) preadv(r2, &(0x7f0000000100), 0x20a, 0x200000000000000) getpid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgid() ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000280)={0x4, 0x6, 0x1}) fchownat(r2, &(0x7f0000000140)='./file0\x00', r3, r4, 0x400) 12:39:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/mls\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x20000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x2, 0x9, &(0x7f0000000080)=ANY=[@ANYBLOB="f5810101010000009500000000000000180000000100000000000000030000009500000000000000f5f2c2fffcffffff154b0200fcffffff18100000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000100)='syzkaller\x00', 0x10000, 0x10, &(0x7f0000000140)=""/16, 0x40f00, 0x6, [], 0x0, 0xe, r1, 0x8, &(0x7f00000002c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xc, 0x7f, 0x4}, 0x10}, 0x70) fchmodat(r1, &(0x7f0000000700)='./file0\x00', 0x80) accept4$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1f, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2400000, 0x0, 0x0, 0x0, 0x401}, [@generic={0xcaa6, 0x8, 0xc487, 0x5, 0x3}, @call, @exit, @call={0x85, 0x0, 0x0, 0x2f}, @exit]}, &(0x7f0000000400)='GPL\x00', 0xfffffffffffffff8, 0xe7, &(0x7f0000000480)=""/231, 0x0, 0x2, [], r2, 0x1b, r1, 0x8, &(0x7f0000000600)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x7, 0x3, 0x1}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0xfffffffffffffcf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:39:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}, 0xfffffffffffffffe}], 0x15f, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/64}, {&(0x7f0000000840)=""/4096}, {&(0x7f0000000080)=""/30}, {&(0x7f00000000c0)=""/86}], 0x130, 0x0) 12:39:47 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000100)='./file0\x00', r2, r3, 0x1400) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:47 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/exec\x00', 0x2, 0x0) socket$key(0xf, 0x3, 0x2) socketpair(0x3, 0x5, 0x3e0000000000000, &(0x7f0000000380)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @loopback, @local}, &(0x7f00000000c0)=0xc) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x514, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x80) recvmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/28, 0xfffffffffffffc5f}], 0x1, 0x0, 0xffffffffffffffa9}}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) [ 1674.624607] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 12:39:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='children\x00') ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x2) socket$inet6_udp(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x100) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) write$UHID_INPUT(r1, &(0x7f0000000900)={0x8, "a2380d2fc504f0c4ec96b10cf8123446a93b96a589a5790963e6baf6cc68a062a946010e3ae050a64626930c9b23c4b19ca2ab2f72cb3e3848c975be6beb9b99b9404c7a16dc0f8457dfb5cc090797337fca64b110559a7a90e0d45eb4757bc9ea80d1b6524b3fa9f8529c7816edb95d94a9bc7e0a8310f71382391220a4b0675376908c74b9805b644aac6507009c6cfda1471a65565fdd274869d489ac4f567ddb9f8be0abd85b828badb6ff5da82c28c99cca2c923ede33db3fdff65e091f9804584037612050301847ab4b31e1b1960e185c1f1fab8ef98eef85fb45884b0ce6da6d2a4ff14c5e5da3a46a46dfcf8737e3aca494a7dddecca1cf93d3ee41b4784d8224a166f2b716166544cc8c1719c2ca7130eb9fd608f80c1cc4361a41125e449b2cfc77b34040af9766968dc2fada563019e6770c092f90cceb786372b44c3495ffeb4e7f457a005d96c8fe10a0ac288634aeb2647f5b4e276a57141ee4f6cbea9fc72e118a75866afb634d9f2237fff883ed49a36dc0b1cb32a2ec983bda5ab7a26f84becf3aaf4f454cb2e9591bbe51dccb3821828a6e3584a8c1c86dfbc136a9598854b1b64b22cf41e552b3392470c03fddbc497273d962b440e7afdb7c4872f8cfd44a07e9339db972bf3eff76fd3d1b52eec10e0052228ec3632497a9cfbdb6e6a946cd53ebf160fcaa13902b4894a555ec41de73a53561bbf6cebd367d7b73c187ebebd9c11c9bc5c48c4b05d670cb8aaeee1d538367f0e76c0cb7836143791066c818efc180e025db688c6b6ecacba497748a4e8f5ba967ebd6068cc921c895868093e417dbb905d6457b4bbcb1540498427c86f5629c4aa148addced8b25739efb3168463a9f9ebe5a7a9c558f19d092f7456c53d29bc5f7e523463ad8d4948fc901cd4ceef654893ae609cc82e1a8cc8844f81b3be1e66b2aa595d42eec4f8f003856783d1bdc4092d1add28b43d41834861400974b0bcfd384ef76bbffe8d50ee5eb89c71b12d4916b5a87cb83f0e256831a09d84d20c635cf8ceab6be77b6396d730753befbc0046cb10f251c930df2afa2dd9840b67985b21c0cf46c01d777ee947303de8ee4c06b876210ba52f4632bcbd01f26ba5dc9e58b3c37901cbac736c89eb448a27d7b2413a381ee080af4b89eeb06082c31c242f996bebc1803f5182eb9d63b79ee23bab2315dc9a67352216378ebcafbb94e93fd705e1846bbae59e2cbc2eeb36363131f0dd82afc7b96074d2d7d55e0b01c9e15c85107cc11d2a7dcd2e95f5ec0d13b545f2150e09dbe59cdb8c5516909d56f7c09b7d060ed4788a28ee33af18618522cc982e051ceeb4f60c1d0513ac0375ebc4c99ba555e8ebbf00f63e4ea2d06d37d736305a25596c0b11d2cb3b44daeeb22fcf64f41bf1d06d35f568a3779e1f32068b5efdffa40a7a2f8af158668bcc6a25a68ae7145c33ed1721e7d9369b3a922dc4bd1284a49eac8f62744c53ebf3cb3fa5bdf8f9cfc4c5f688992e5f95d3fe2c8588a7fddc9c788ea2d78abc71525f3d15968984ed848a4904b03b33fc2ee8b8d3b13a85ae168bd641b923248ac5a382ea51f50915f2ce37f13b08e870553696e3be8c635d901dd49bba95bbf1be6756287e991c49486c9ce0ea231483c880ce094f59e409c2137387c504b35c65e057527b6d66131a371a872cb28ae84202c2d5dbb68a36acd7e042b2ddb3a34f440b8eff57f4c0053969a606e0f943ad4b34c666a4d4da3fb0ec2ab29dcd0514d0d5548f7946c56630d9f13813cef34b8b7a5de9e1cc90415210f413cf6621f76c74e54057ee0329720df138b56193a69982e9e3dc7a6cbd83e69bd294c66eea320dedc34a7373034748f12391857aa19c37e7d4bc2e520165537b5a9581ac8e92a9987cf40b84a3dcedca92838b033c63419edec768afe7a253cd0027d38f1defa80fa3cea1f4875dbc142a976f2b333bc48e9f713b3bd2afc03a6ce0e586c9090a1fe57a38d6ba2a091915e27d7e42f89f6518ff3857d3272cfd63ad4f38b361eca9cadf99358cadb0d73f63f6ff0798f633fce2a2883941c5c726e85764182908a46a47717fd4c9840f3de913e4d530219e2eb7015534e8113ef401f2c32509d0453327c1ff47fcef8210ae9ad0ca5ac2fa6299553c6241bd3f17d8a125eb0c16f753e8c6352a7a4054933c30fb44c40492fa5d4692f9359f0314e4b8e77f6b632e9f39b5561bbe7a24ea857533a6b1784e47f893df8e151a143c687c742cc16bacebe0bdfebf476abc2ec23390de952e08867c98060ed357df13090f577d6209cc75e3139c9d0ed44b9646c30e214ba46522386330a116b030508e8362e672d172878940fff1c9386968bc76c974f59e82b7d346d55f48dcd093d253cfcd700e35feadecbce21c2bed28a7997e217c459de4407dafc162ff69fa53eebc928a834828f608a556614300d01f68acaabf0cc730cd95018da9554ea4e9ead25c2b6890273b0059c1c1c8fb620895cb43f3131faf27318412cb84a496d40b00c121bd4e57c8ac7f737cd8e9e192b0f328add1e2adee2f631d0accf32246df703f5042f3faef1d4bdc52db95f41e286622a431c9d36413f51707e93cb2a79a8a047c15f7c78ebe0a10580652280b5bb80fa72f458eb8810f50c03b7e8b94e43b0d538a6e50747fc1880cd49084849ca5e1004bfda8e04fd12073aaa6e06cb5ad302f3967af95bb7687ea07d3d1d5f9250f2e6ab63ea5eb4265553482fefa68f56c2e9e0b76b367faa23d036f542ed580330f1edd0d575dd46f35d93c04fc36b76dd97bf96c8645050d8d771a01698f21f8570922c96431db5526abafe1b59631b5b4dee24169a44f3b96c27b2112682dcafb90819f6f92d370fecf3c98b141593d20acddff486cce31c392b4189dc302a9b755aa210a50d5b139440fc23906d91c31423c2a1f5e042c9119faec463bb4b060ee61bb0c445223fd91dfa7f6d15d6ff2f964f195635bf1f69a09eb5d8854d4d76678811ccb205bdd871e2ac92146b4169e733e54fdbb799114deaabc8038ff01f674cba71778f7171fe9753d6c1c11542edb376e466b9f9aa8853c55a05c6eb87d71504375398ba1fe444c4e5a15f67acb46a6eca49a99c0116355329b378a8a2724781ec966cdfa0c2678638652e24cdb94c010f3eae333717f72d80a57f3023e9e31cfc6e61bbdbdc79884cc6594c9d990ac0a6433948d80046c588f1b27443796c5983ef3880867664d74e225adc9218f2f7c2c74efacdbe7d4322f62c582ce812e7ce82e31213d9d17f75a558d2d0f8ea029afa747043a141f3ae5b18819088309bf20ebad81efbee4c72897e0190115acbb561623fce903d84db225508312a88c2319762776ab20dde66e49768215ce413d8c3ead24b778b0ebbc59e495f93c616db80ac6369447258a3ccf993205e163e8e2f3dbd2bd1407ada38ec0431df23f4b536d6378d76b3cc6dfb4c884a035001e5d859191f4264fa7f659cd15b05a0f27ec056ad53e9cf8497d988b04f88798f7e05163929a90ab051967533e3a74850ff2146e8dea51ec28854a872c79ee33ed465ed023918fad81a9db93ff700836875cc988d9108f0ec55deb49c55fbe5a2d82e1309b77cb9523052534cca62ee67d409bbac8d8e0e40ae99d3c417c2b176371e5abb83b3ef6972942ac964fc8f2d204f4cdf2a42bd9b56c9b66670b49fcbe0e5c727ffd00d14cf4e383709a90854f9ec704e32981b51996ff45fd5111e0e8f14b49ba3ab3be90e90800dc2c46d8a2134d77e12489a1b7b4c88b36d2235bbf61e4abd031709d513eed2077a3b0eda84b16e17da2550ae90b0381b9b80f97a2a75553fd72b2c8b52bb49c3f0d3151cb4ea95318b02eef60eeba605b98feaefcd365a68fa3e95978826caa7189b42eb070e768838c1fde07212acb720961e2cb6b81bf071326a79c84e3f2f49dda21a926c1f0de67ddce07a790465f4616e4eb21e6899a4c65b19a0ce86570e9d7dd238450eb4cc1e02f1b75f7621051664fda6823cf2c385bb8fe62dcaf7adfbdfaee599da3698fc3b3c30cbe1c8626fbc35705a9725e07107458d083efadfdc0d22bb19654d9d63a85c372a2bcb50fca0cb1c47e73d0dafdb3e48c6c72048e8f8ed917226c775752bb18f67635106adc7078596a41b20543b497693ce193b9ebe28c9b0f668b9f1647b5e91ef6219d506c33ce6f03ca717aa2cd0e5b86a4624432a118cecbff2e50a9370ea236b20d5e6eee09ebde1a81610aabcac3406997fa5c66f799ac3ad6c96386381baea062edad11a45cba159793bd7195e17dd97448ad3638defa86724fed87415d7893299df88f3eb863f4f4b785c46164b5f6b9454ed0e08cbbc83734bf2f2297fd5df882dfbd74f7f375dd7cf54882c925ac94d66631eec6b1b98e24843e38ea09195903ab313d39b144e92d556d9ea0bd9c8e6d8310209e7292dd05d5d2341a593f6c47fe551ce231dca56b6d8ae8b76f52e3e6475d4d7f475cc1cf089d71c8adfe2fa5f300cec2da97b65de9d45ba30c84d95dae757d275cf5dddf091122cf93ecdda699f0e90d8f639c60633ca97c9f90b212affb0ac3423d4c369449bc5458e7c6533d23fc627906b2ece1824f0f8e62f8d5f0822b71cd02943318cf74560a229cf3a9ce5b9379ddbb741a9263689352615095e83885ca5c7a927cc88527ab35d90beb449b8ccc7d493b05193bed8c85d48b69372891d11413e428647ed1c04ef568422236871c5fa180bd419bdd097712273340a4dd8b8f85bb8416734e4b2f1e77a1d1c3adddc4d035b109222beea6f38abcc1f33e182922b734fd0dd4fff3b37348b506ba28bf088eafd2ba998b3317396b82b5f82ef3bcc476d3725ac7b0b933c0af811c9b8fb87abd6b7a11338dac1a844c9e622c6a6b7a10f69268292380acb4b41eff7564065227e9a5026d91bdafd24b874de755ae1233e5ef5621af6acec464798ea42d2b002b20a63e68e767452c445668e9d0596df5e7f8741fe93f795e49ec7d23d25648ca71fc55e9c40e7f7044cdc22f08f3f32a03b1699a20b2cd8464574c503bd72d6f8b241bdc0d7a1bbd0403578beacde26203bb729f99e443697312f6ac62752e8fe337cf3b583941df49cbd2c1e3291516f55d4a7d7c64cf48d79d5ef31313432d29f7e117bf77bbaddaa0be244004cdbd0256aacf1844fc09eb8a67230ce0a88b9661b3dbb948f2443941b2726ff3b7bdc27ab7f783b5e6f6d08aa96dfc60a20cf9aca8075c972f75bf7632c619a43ca8f645833a8c81575bc1865fb70597c0d7bf974ff4a79113ccd54291824279ec246c03fe41c9d9ac04ef2dc91a8cb10bad2c9d4ea91585a22c11d3c0db65ec239dace9542c888d5a55eb073100902e4342418b0508f946edeecb61497301a15f69fd419032b76a987059425d25bb79673fd370510a5c4352c89f27a9799c727b671bdf7d039250a73fb9768c5e4ec7bf74a11339d5887fd4c584f4eff930959dedf43931f1d85be3002aed35a07d5733b78a5de0acdecd0aa7815d57bb7db5800bb2419326f0cb630039677d2b7d8b09e6f8efe320a393be23328d5b7b46f1090d0a6821f2d1119b247ac05e1223f0a10959af843f19bae9379bbe0628f3b7f4b87047e7d715c438f1395d4407a65f6545cb22242a3e174e195eff9e78d9cccccde5949743a81ad9c8c38f7b508ad119ceef059f215903453ebae74cbcc75137ef1f77650f52495651bd2e6f4083e0a99f17ce1cd1d8a311a6e45d239b6c0a3f39d4b9a", 0x1000}, 0x1006) 12:39:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) socketpair(0x1b, 0x4, 0x20, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x400000, 0x0) connect$inet(r4, &(0x7f00000006c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r5, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4}, 0x0, 0x0, &(0x7f0000000480)={0x2, 0x3, 0x7, 0x25f}, &(0x7f00000004c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r6, 0x10, &(0x7f0000000640)={&(0x7f0000000380)=""/242, 0xf2, r7}}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r8, &(0x7f0000000340)=""/39, 0x27, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r10 = dup2(r5, r8) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, 0x0, 0x0) ioctl$RNDADDENTROPY(r10, 0x40085203, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000770000009229b8785b08547965734b896a3ec3eded05c67b5b510f27800fdee2d5416c516cbd8e7e2657ceb1e929d0dbe5b4dd358ab59a4358302fa7121978def89dcf9655343f196777b4e73d53deb32e1eff56b5c176377a076dfacf48592a7b32e00bc3e938990a2ffcf7e7dc660e8995b060fc3ca490c15cf6"]) fchown(r3, r1, r2) r11 = syz_open_procfs(r0, &(0x7f0000000180)='net/ip_tables_targets\x00') preadv(r11, &(0x7f00000017c0), 0x199, 0x0) [ 1674.730302] ip6_tunnel:  xmit: Local address not yet configured! 12:39:47 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) accept4$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14, 0x182688f81f0e3dee) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000600)={@local, @local}, &(0x7f0000000640)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000680)={0x0, @initdev, @multicast1}, &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@loopback}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000bc0)=@hci, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000c40)=""/164, 0xa4}, {0x0}, {&(0x7f0000000d80)=""/200, 0xc8}, {&(0x7f0000000e80)=""/96, 0x60}], 0x4}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000fc0)={@initdev}, &(0x7f0000001000)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000002980)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001180)=""/201, 0xc9}, {0x0}, {&(0x7f00000013c0)=""/45, 0x2d}, {0x0}, {0x0}], 0x5}, 0x7}], 0x1, 0x0, &(0x7f0000002a40)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002a80)={{{@in6=@remote, @in=@remote}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2000, &(0x7f0000006e40)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000007340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10003000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x4) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, 0x0) close(r1) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r4 = dup3(r2, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TSC(0x19, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, 0x0, &(0x7f0000000280)=0xfffffffffffffdbe) syz_open_dev$binder(0x0, 0x0, 0x0) [ 1674.856861] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 12:39:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/296], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') 12:39:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xbb6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x84040, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) read(r0, &(0x7f0000000380)=""/165, 0x101d7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xbfcb) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 12:39:47 executing program 5: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYBLOB="28ce0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000340), 0xfffffffffffffe17}], 0x3, 0x0, 0x20e}}], 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb01007300d8000000490927030000000000020000000002004b01fa36d7d1070b41f8a32f95f13bd04551469b0e40c53cb64b66a8439bd175f8f608c9522b08c53d350f52b5122308fbc3b475befd1b75dcb16d42dde1ec9f80212f8c8c58ae5e9e8cd6b619011b5ed423843fb1"], 0x0, 0x6f}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$setregs(0xf, r0, 0x5, &(0x7f0000000140)="c282b4d20fb5fd984810030b07bf0c92194ea09de08bf25f38b6cd490f785bda0cdc591526e0471fadbebe5d24f5c77549ffcbe11fc3a4ae52286edf7e9a2500a28b5bdcaab024f6cd3b8dcdcffb0801f67fd51a6ebf773e4c6d08ccf0d9460db1dc2aaf7b01cba1ccf85e706dc11d6bc11cb03495ca403fc0c4522de1d3fc42c839911dc75099460a1956c8b2ab27667f9a35e6bf8040185cf0d832e7bd5c8a8a2efb2af08ee96cfe533af54c22dc864c8c7392042da18652554b406f054dc8385639a21006810c5219e4a820a407ba1d47c9b7153e52f2b83721fa3104d0bca54ce56f0603cb019742c00f766aaff45e1640029736") 12:39:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000280)=""/28, 0x1c}], 0x1000000000000115}}], 0x1, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x840000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x88, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'nr0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x20008004) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 12:39:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0xfffffffffffffe94, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x8}, 0x344) 12:39:48 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x239, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffc45, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1000002, 0x1}, 0xffffffffffffff9e}, 0x47) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='nt\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:48 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x40000000000c, 0x3e7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4a}}, 0x48) pwrite64(r0, &(0x7f00000000c0)="a45926d2b4d17dc9d572a44bbcb2cfd4dd78c0a62df20d0b554322799fda5dc3f3f15825cded9a71e29f78387a8c163d47fa9499c2b14bce3bbbde397de96c01aa2f71c3499e34e73aebb99e4386059802ff5e82cb65a0caab86e574de2021cdbb5426e276a7b4a944ea9eadd58c1c9c5c1cd789fbddd022742867004e41e3a396242a9d8c", 0x85, 0x3f) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x400, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x59, 0x9d, &(0x7f0000000380)="c6ac517c802ee43c0672226c7b71297885bef97d9823d6668e376200bb894985eca4e3fa333f169cbc41fef7000610610d9e86b9e1585e5ce7ed61f9c50800152bb27d67e4c31dfa0985774225066c4cf6e396c047462e8229", &(0x7f00000004c0)=""/157, 0x3}, 0x28) dup3(r0, r1, 0x80000) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000002c0)=""/20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) [ 1675.231174] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 12:39:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) 12:39:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@rand_addr=0x1, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x1, [@multicast1]}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') socket$nl_xfrm(0x10, 0x3, 0x6) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) 12:39:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x800, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x480500, 0x0) poll(&(0x7f00000000c0)=[{r0, 0x22}, {r1, 0x80}, {r2, 0x189}, {r3, 0x1000}], 0x4, 0x893) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$RTC_UIE_OFF(r4, 0x7004) 12:39:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ioprio_set$uid(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)='\x01\x00') write$P9_RREAD(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='7'], 0x1) fsync(r1) fallocate(r1, 0x0, 0x40000, 0xfff) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 12:39:50 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000190703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a050000000000000000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc7e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c00"/258], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:50 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:50 executing program 3: write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/ip6_tables_targets\x00') setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000440)={0x7ff, {{0xa, 0x4e20, 0x7fffffff, @dev={0xfe, 0x80, [], 0x1c}, 0xff}}, {{0xa, 0x4e24, 0x7fffffff, @mcast2, 0x1ff}}}, 0x108) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r2, 0x3) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000580)={0x8000000000000000, {{0xa, 0x4e23, 0xfff, @loopback, 0x4}}, 0x1, 0x4, [{{0xa, 0x4e22, 0x3ff, @empty, 0x1}}, {{0xa, 0x4e24, 0x0, @remote, 0x4}}, {{0xa, 0x4e23, 0x24db, @empty, 0x19}}, {{0xa, 0x4e21, 0x4, @local, 0xd1}}]}, 0x290) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000007, 0x100013, r3, 0x0) r4 = socket$inet6(0xa, 0x401000000801, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0x3) sendfile(r4, r4, 0x0, 0x8000fffffffe) socket$packet(0x11, 0x2, 0x300) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x4, 0x5}, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)}}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000400)={'caif0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 12:39:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 12:39:51 executing program 0: r0 = creat(&(0x7f00000005c0)='./file0\x00', 0xa0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000600)='\xa2\x94\xae\xbc\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000640)={{0x2, 0x4e24, @rand_addr=0x80000000}, {0x7, @dev={[], 0x20}}, 0x2, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, 'lo\x00'}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getsockopt(r2, 0x1, 0x3ff, &(0x7f0000000480)=""/245, &(0x7f0000000580)=0xf5) socket$inet(0x2, 0xa, 0xffffffff) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80800) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000000400)={'filter\x00', 0x0, 0x3, 0x6a, [], 0x7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)=""/106}, &(0x7f0000000140)=0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:51 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@initdev, @initdev, 0x0}, &(0x7f0000000080)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_triestat\x00') preadv(r2, &(0x7f0000000840)=[{&(0x7f0000000200)=""/200, 0xc8}, {&(0x7f0000000300)=""/212, 0xd4}, {&(0x7f0000000400)=""/59, 0xfffffffffffffea4}, {&(0x7f0000000440)=""/187, 0xbb}, {&(0x7f0000000500)=""/96, 0x60}, {&(0x7f0000000780)=""/17, 0x11}, {&(0x7f00000005c0)=""/183, 0xb7}, {&(0x7f0000000680)=""/64, 0x14e}, {&(0x7f00000006c0)=""/143, 0x8f}], 0x9, 0xfffffffffffffffc) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000100)={@remote, r1}, 0x14) pipe(&(0x7f00000000c0)) lseek(r2, 0x34, 0x4) 12:39:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x10000050, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x7fffffff, 0x7, 0x1a, 0x18a}) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080), &(0x7f00000000c0)=0x10) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) 12:39:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xe, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="006ab46b000000f52776986af747ce9a617491759e3c46208110eac9fd571b1ad5ee7cd09fb966ab647676049900df3e41a5a557fd5ae69eb9fb5fbab230dabbbefac70f22d6b07b9f861b9b86fbc5cfe16ebed329eaabfd468217dee60c4e791f1503003aa442b674cc93b066657a964cf446cc4cb1696f5a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe1d}, 0x48) 12:39:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') fchdir(r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) gettid() fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r2 = getpgid(r1) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@window, @timestamp, @sack_perm, @sack_perm, @mss], 0x132402) clone(0x100000000001fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f00000000c0)) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000000)=ANY=[@ANYBLOB="0000020000000000ee8800"/24], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10000000040) fcntl$setstatus(r1, 0x4, 0x42803) 12:39:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) get_thread_area(&(0x7f0000000180)={0x9, 0x20001800, 0xffffffffffffffff, 0x81, 0x9, 0x400, 0x3, 0x9, 0x2, 0x8}) fchown(r0, r1, r2) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 12:39:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x402}, 0x28) 12:39:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) 12:39:51 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r1 = accept$inet(r0, 0x0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x4000000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x571d2f42142c0101) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x83ffd) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = accept(r1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r3, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) ioctl$FICLONE(r2, 0x40049409, r4) 12:39:51 executing program 3: socket$key(0xf, 0x3, 0x2) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x1, 0x9, 0x3, 0xa347}, {0x100000000, 0x7, 0x8, 0x1}, {0x3b51, 0x7, 0x8, 0x8}, {0x800, 0x8, 0x101, 0x4}, {0x6, 0xe7, 0x3, 0x10001}, {0x1, 0x1000, 0x871, 0x3ff}]}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f00000000c0), 0x4) 12:39:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'osx.', 'net/fib_triestat\x00'}, &(0x7f0000000140)='net/fib_triestat\x00', 0x11, 0x1) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000080)={@loopback, r1}, 0x3) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 12:39:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x4a, 0x1000, &(0x7f00000000c0)="ad15b94651a020b8206f00cf7cde77019bcd41e2686660c8a10bbafe51053f5a3b58b8164a2027f93e5a5ada8e927e8c49d86c393d2313ee45e6041ccd7a3ce643ea8876d49d7d57bf8a", &(0x7f0000000900)=""/4096, 0x6}, 0x28) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f00000002c0)='./file0\x00', 0x10001, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000300)="b3e676ad05f1cb3e2b071c272b9573e00d7c3cd8d47d5a99e197ec6ef730806dab508ee31da3e1e9e87aecccf0cb2018ef", 0x31, 0x9}, {&(0x7f0000000380)="ec65e97fa3ccfd6407416eb5199f6b8ee22d5c4eebc3927c3b8b105204755ae4eee5c1818f4b184032ef66be4f05463ac8f792055a4a8d9e79a9edc10a3ce2d01ef647efa6285e2b27a476ff82d3b00cb1d077cb4fc71a1f5eadcba0c1c235e981557864a9ef34bce1b4de95cba3ce2e2847fec12df4ba7fba14a3d5e28fe82169fa1be25eaa80a3d68401cc1d91355eaaa0c24f89339a45d803889cf395280d32935f0bcfd3e6226156e2", 0xab, 0x5}, {&(0x7f0000000440)="fe4a2e37686060a76bc4f8d1fc1497ad9f723910ff609a02f13fa5d5f733fc5eed27b4d61a466e583312cbf6891dc22155b81cdca0760835c1eb57809cd411cc843fc44b54a56304502bbc646467ee547180362a437b3fc8f3c6c39665cd28214928ace2bda403a8d595c99bf587723c4c1fa4dafb21774c72d026572826dee78255cb0fbeafa64c8223023bd4ad5d8d9ad28f75d75ee2bd14cbc655ab146ca04e14ac1ce4836d3288c12303972e98bf66c8f7c61d7489a275b1ac9955b49f", 0xbf, 0x9d}, {&(0x7f0000000500)="84f27d5d055d797816cea0a41190c8601ecf7d46b0b95a15d90ebbad11615b05f21b1333139c3f1758910eebc7b6b1f254228a89c317edbd23513a4c4c77b0fa38ead57246fe9c5d0650ea4eef89d06176e7a370d398e2d99008d89ad8a06c55014344e42f338bb5743847dccf58a1c932c2a54983d3f62f5b92db30cae65d0c518f669466dfbe9a4359dc42a3132ff0ba16539f2c17c4e8ec241a2c02f94c8cf9e866dcfff151fa1d15d79f13718a7a56db8694d9208e8f6377b418", 0xbc, 0x9}], 0x2010, &(0x7f00000006c0)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv1='jqfmt=vfsv1'}, {@data_err_abort='data_err=abort'}, {@grpquota='grpquota'}, {@nodelalloc='nodelalloc'}, {@dioread_lock='dioread_lock'}, {@noauto_da_alloc='noauto_da_alloc'}], [{@subj_type={'subj_type'}}, {@uid_gt={'uid>', r1}}, {@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, '{procwlan0\\'}}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0", 0x0, 0x402}, 0x28) [ 1678.898581] usercopy: kernel memory exposure attempt detected from 'names_cache' (49235 bytes) [ 1678.911976] ------------[ cut here ]------------ [ 1678.916754] kernel BUG at mm/usercopy.c:71! 12:39:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000080)="b9ff0302190d618c2259a04ff4d0cf", 0x0, 0x40000402}, 0x28) [ 1678.939969] invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 1678.945928] Modules linked in: [ 1678.949146] CPU: 1 PID: 23536 Comm: syz-executor.0 Not tainted 4.14.137+ #29 [ 1678.956342] task: 00000000bad7dd59 task.stack: 00000000e15d961c [ 1678.962501] RIP: 0010:__check_object_size+0x2fc/0x3b2 [ 1678.967690] RSP: 0018:ffff8881a1b7fbc0 EFLAGS: 00010286 [ 1678.973059] RAX: 0000000000000052 RBX: ffff88819e6bfff7 RCX: 0000000000000000 [ 1678.980338] RDX: 0000000000000000 RSI: ffffc90002bc4000 RDI: ffffed103436ff6a [ 1678.987612] RBP: 000000000000c053 R08: 0000000000000052 R09: ffffed103b764ce9 [ 1678.994882] R10: ffffed103b764ce8 R11: ffff8881dbb26747 R12: ffffffffa28bcba0 [ 1679.002151] R13: 0000000000000001 R14: ffffffffa28bcb60 R15: ffffea000679ae00 [ 1679.009416] FS: 00007f0beeeec700(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000 [ 1679.017653] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1679.023587] CR2: 000000000075c000 CR3: 000000018b6f2003 CR4: 00000000001606a0 [ 1679.030854] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1679.038289] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1679.045551] Call Trace: [ 1679.048138] bpf_test_finish.isra.0+0x99/0x160 [ 1679.052713] ? bpf_test_run+0x340/0x340 [ 1679.056802] bpf_prog_test_run_skb+0x528/0x8c0 [ 1679.061404] ? bpf_test_init.isra.0+0xc0/0xc0 [ 1679.065897] ? fput+0x19/0x150 [ 1679.069077] ? bpf_test_init.isra.0+0xc0/0xc0 [ 1679.073561] SyS_bpf+0xa3b/0x3830 [ 1679.077006] ? __might_fault+0x177/0x1b0 [ 1679.081056] ? bpf_prog_get+0x20/0x20 [ 1679.084843] ? _copy_to_user+0x82/0xd0 [ 1679.088770] ? put_timespec64+0xbe/0x110 [ 1679.092823] ? SyS_clock_gettime+0x7d/0xe0 [ 1679.097043] ? do_clock_gettime+0xd0/0xd0 [ 1679.101180] ? do_syscall_64+0x43/0x520 [ 1679.105142] ? bpf_prog_get+0x20/0x20 [ 1679.108928] do_syscall_64+0x19b/0x520 [ 1679.112816] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1679.118009] RIP: 0033:0x459829 [ 1679.121199] RSP: 002b:00007f0beeeebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1679.128914] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 1679.136238] RDX: 0000000000000028 RSI: 0000000020000140 RDI: 000000000000000a [ 1679.143500] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1679.150759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0beeeec6d4 [ 1679.158102] R13: 00000000004bfb92 R14: 00000000004d1778 R15: 00000000ffffffff [ 1679.165373] Code: c7 c2 a0 cb 8b a2 4c 0f 45 e2 e8 f0 13 db ff 48 8b 04 24 49 89 e8 4c 89 f2 4c 89 e6 48 c7 c7 e0 cb 8b a2 48 89 c1 e8 ff 41 cc ff <0f> 0b 4c 89 ff e8 aa d6 fd ff e9 48 fe ff ff 4c 89 ff e8 9d d6 [ 1679.184557] RIP: __check_object_size+0x2fc/0x3b2 RSP: ffff8881a1b7fbc0 12:39:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0xff65, &(0x7f0000001b80)=[{&(0x7f0000000800)=""/28, 0x1c}], 0x1}}], 0x4d5, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x70, 0xfffffffffffffff9, 0x137, 0x100000001, 0x8, 0x0, 0x2, 0x80000, 0x4, 0x1, 0xffffffffffff90b9, 0x56a, 0x7, 0x113, 0x9, 0xb9b, 0xc, 0x4d0, 0x6, 0x5, 0x0, 0x5169, 0x511, 0x40, 0x1, 0x300b, 0x80, 0x8, 0x3, 0x100000001, 0x1, 0x29, 0x1, 0x7, 0xffffffffffffffff, 0x7, 0xb453, 0x0, 0xc925, 0x6, @perf_bp={&(0x7f0000000040), 0x4}, 0x2002, 0x522d, 0x7f, 0x2, 0x1, 0x40, 0xfffffffffffff680}, r0, 0xa, 0xffffffffffffffff, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000100)={0x9, 0x40, 0x8}) [ 1679.197064] ---[ end trace fc334861b4d20a71 ]--- [ 1679.203035] Kernel panic - not syncing: Fatal exception [ 1679.208742] Kernel Offset: 0x1fa00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1679.219662] Rebooting in 86400 seconds..