) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) [ 290.815773][ T51] bridge0: port 1(bridge_slave_0) entered disabled state 10:17:39 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') dup2(r1, r0) socket$nl_generic(0x10, 0x3, 0x10) 10:17:39 executing program 3: r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000080)) r1 = socket(0x1000000010, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f00000000c0)={r5, 0x400, 0xea, 0x1ff}, &(0x7f0000000380)=0x10) r6 = fcntl$getown(0xffffffffffffffff, 0x9) sched_getaffinity(r6, 0x8, &(0x7f0000000300)) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x6e) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r7, @ANYBLOB="0a34ebdcc85f0958b1ef27a165ffb58a59e635b9a453ff0000000000"], 0x34}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 10:17:39 executing program 0: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:39 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000100)={0x7b, 0x4, 0xfff}) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000040)="6b8f509c1035d3981ed74aa7201116b20d3ba8652fce8585866e07555d8c30b3587c12ccab8c284143d78b4445608e6e28ac91b04a4247a9bfe182fbcac4267a1e2bb4ad4a478425f898af12760ce092fe39120f0ddf77b9197dab9d11dec6d5b5c2914e4364515c9619ebcc1859275df64323b7dba7ee24eb3e937ab33fd283f11a31b9119d75061a2cf891b25ffc0ed50cba9ae2b63aad970df6b19fbac0e52319420ed6bb35") ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:17:39 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') dup2(r1, r0) [ 291.341690][T10266] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 291.395241][T10266] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 291.448391][T10273] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 10:17:39 executing program 0: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) [ 291.517632][T10273] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 10:17:40 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$dlm_control(0xffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x100, 0x0) r2 = gettid() tkill(r2, 0x1004000000016) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 291.594437][T10276] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 291.640819][T10273] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 10:17:40 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = socket$inet(0xa, 0x1, 0x84) listen(r1, 0x8) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000080)={0x8, 0x80000001, 0x3f, {0x7, 0xca25}, 0x911e, 0x3ff}) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 10:17:40 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r1, r0) 10:17:40 executing program 0: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:40 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) dup2(0xffffffffffffffff, r0) 10:17:40 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:40 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) dup2(0xffffffffffffffff, r0) 10:17:41 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:41 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) dup2(0xffffffffffffffff, r0) 10:17:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)="2e00000013008105e00f80ecdbc0b5f210c804a01e000000302e20000000a3030e001a000a000700aacc2b2043b2", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') getsockopt$bt_hci(r3, 0x0, 0x1, &(0x7f0000000400)=""/158, &(0x7f0000000080)=0x9e) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="65727370616e2fde0000000000000000", @ANYRES32=r4, @ANYBLOB="00000020fffff9ff000001ff4c46003000640000082f90780a010101ffffffff831b10e0000001ac1414aae0000002ac1e01010000000004d6b60e00549f72ed2d450aa8a6064fdd0d957011bea3d806bf04c3f169c2eaa22e84bab7c754b7e9b9c4f37f8d738496faffbdb97e5f45022dc973d47a38b77540180de90f95ccc20d5a07f488809e636a7c20bca078ec1562f4f1e1776a443067ed9ed050a62377860f2e4c516c6e8ffd58e41c59fe6be5da01844a19d6751238fdbb8c39fa602d2b8f068c873c7d5ea998fa1f01ae0f13d0632a"]}) 10:17:41 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r0, 0xffffffffffffffff) 10:17:41 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:43 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000100)={0x4, "52e131f83e7e5a3bafde2db518394b28a4bd69cc3296342ebb7b846de82765fc8442741e0ce482747631faf50a3a4d58f64b8e18d663e423e6cf77b066680febf4d4dd45ee55cfac1c8c218ca506ffa9e633bf52c3bbaf6271153c5e87a386e1ae984d7de7ed8dd06dc447373a713ed2eec40c276d7ee1de93b1d224eaff5a94aa311ce5efb05617d0118bd0107eec3a220a860afe9a54c8ef8d7d2646a5b6d9e77e0cc1d8e4a93666f28bd1b7333e8c3ae8c1d64947afef531c91489b38056e10effdd5a6ccff0b99fce8e9dae728230a1daa38a9e9f54fc1461bf72d1f1dc12ae2bb1635dee95d23f1e23902e54f03afdce447a1de754fa76bbbe63bfda0a561ff84ca01545bffe94803e3232240f2d2e08e3fc07f4e8bf14f30947ba83c3f0db1ac257b88be947b5e25f7fc4e93ecd90829ff8ab040e9efb4b53fb62d2af452febf43ccf11a34481ea5e7e6709c2db8b5e89289e2c503db868cea5cbc07568d5c82d6dc153c07c764322e179a3f01e80b2e364abdd13306e934dbd3140e830f87e383d44111b865b1a56e527a1d5af583d64774e17e257f84ff4c74520d7e4494d7afaca32792576fb80b78e5996a16b692fb0774a781ec4ea57fcd1de63c5ade866deb1f7f4868b1bdd40c43e37176ec41c60d48fae8a562c11cf94494d59ea873c53e0f5c26f96c1b9168481e5099cac41cdf4313ce9462074087cb0e9d"}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x100) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(r2, 0x4144, 0x0) r3 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r3, 0x0, 0x0) r4 = inotify_add_watch(r3, &(0x7f00000000c0)='./file0\x00', 0x400) inotify_rm_watch(r2, r4) lseek(r1, 0x0, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) 10:17:43 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r0, 0xffffffffffffffff) 10:17:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='iocharset=iso8859-9,shortname=lower']) r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x4, 0x4, 0x0, 0x9}) 10:17:43 executing program 4: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x410102) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x74) openat2$dir(0xffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x10001, 0x23, 0x6}, 0x18) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) r2 = openat$proc_capi20(0xffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x10280, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000180)={0x2, r2}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x0, 0x12, &(0x7f00000001c0)='/proc/capi/capi20\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000240)='}\x00'}, 0x30) r5 = openat$selinux_attr(0xffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000300)={r1, r0, 0x1}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000340)={0x0, 0x1, 0x6, @remote}, 0x10) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r1, 0x4112, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000380)=r1, 0x4) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r6, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [""]}, 0x14}}, 0x4000000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000500)={{0x2, 0x0, @identifier="5a3f5b3f8a69faff6a188a5b083e0cd3"}}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r2, 0x80104132, &(0x7f0000000540)) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f00000005c0), &(0x7f0000000600)=0x4) 10:17:43 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) [ 295.024322][T10333] FAT-fs (loop3): bogus number of reserved sectors [ 295.031305][T10333] FAT-fs (loop3): Can't find a valid FAT filesystem 10:17:43 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r0, 0xffffffffffffffff) [ 295.212437][T10333] FAT-fs (loop3): bogus number of reserved sectors [ 295.219854][T10333] FAT-fs (loop3): Can't find a valid FAT filesystem 10:17:43 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:43 executing program 3: r0 = openat$vsock(0xffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x800, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x402c560b, &(0x7f0000000240)={0x88, 0xc, &(0x7f0000000480)="13350056b32af460feed30681175830deb8409745f9caf6607e3236ffec1637c14bcc61011c2b7f9a271745bff88dd9812f272db5acc130f8fd448e88ae75f1da53ff0778e7363f3b54b21dc4199ff8173689a01c00400002961ff49bc7d0a6d790fa80da0832a5c7030d99847a83eb578265631525e6c8f97aa15a8e691deea87ef9322b28d740e2f5fa3f76c99b6cf5cd3faf73bbffd", {0x6d48, 0x9, 0x20363159, 0x0, 0x3, 0x6, 0x6, 0x9}}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000280)={0xfc000000, 0xa921}) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000180)=""/133) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x5c}}, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/74, 0x4a) [ 295.441649][T10345] IPVS: ftp: loaded support on port[0] = 21 10:17:44 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x609f, 0xfc, 0xfa, 0x9, 0x3}}) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x84080) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, r2, 0x4, 0x70bd25, 0x25dfdbff, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x2}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:17:44 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:44 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x0, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r1, r0) [ 295.909649][T10379] Unknown ioctl 1076647435 [ 295.932295][T10379] Unknown ioctl -1073195493 [ 295.958823][T10379] Unknown ioctl -1073172983 [ 295.993812][T10379] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 296.052850][T10379] Unknown ioctl 1076647435 [ 296.059908][T10391] Unknown ioctl -1073195493 [ 296.125128][T10379] Unknown ioctl -1073172983 10:17:44 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$sequencer(0xffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x420000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="04000000"], &(0x7f00000000c0)=0x8) [ 296.150188][T10427] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 296.323588][T10345] chnl_net:caif_netlink_parms(): no params data found 10:17:44 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f0000000000)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000738ff0)={0x2, 0x4e21, @empty}, 0x35) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000340)=[@timestamp, @timestamp, @sack_perm, @mss, @sack_perm, @timestamp, @timestamp, @timestamp], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0xffffffe8, 0x40004007fff, 0x80000000}, 0x14) sendfile(r1, r0, 0x0, 0xedbe) 10:17:45 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x800, 0x6, 0x7ff, 0xffffffc0, 0x3, "0a9e7ccae2d596c054fba2757e920dce8067b7"}) [ 296.839970][T10345] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.847297][T10345] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.858189][T10345] device bridge_slave_0 entered promiscuous mode [ 296.978878][T10345] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.986155][T10345] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.996077][T10345] device bridge_slave_1 entered promiscuous mode [ 297.212307][T10345] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 297.276642][T10345] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 297.433796][T10345] team0: Port device team_slave_0 added [ 297.472764][T10345] team0: Port device team_slave_1 added [ 297.561901][T10345] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 297.570283][T10345] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 297.596361][T10345] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 297.651927][T10345] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 297.659480][T10345] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 297.687236][T10345] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 297.832309][T10345] device hsr_slave_0 entered promiscuous mode [ 297.888622][T10345] device hsr_slave_1 entered promiscuous mode [ 298.037158][T10345] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 298.044788][T10345] Cannot create hsr debugfs directory [ 298.452257][T10345] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 298.533504][T10345] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 298.706473][T10345] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 298.864352][T10345] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 299.352298][T10345] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.401216][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.411045][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.441299][T10345] 8021q: adding VLAN 0 to HW filter on device team0 [ 299.473796][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 299.483790][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.493272][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.500583][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.563777][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 299.573101][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 299.583047][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.594351][ T8631] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.601668][ T8631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.610789][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 299.622588][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 299.633707][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 299.644495][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 299.654839][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 299.665649][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 299.682674][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 299.713239][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 299.722439][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.750788][T10345] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 299.764503][T10345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 299.782488][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 299.792727][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.853176][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 299.862306][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 299.894729][T10345] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 300.081406][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 300.091647][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 300.180500][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 300.190334][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.208249][T10345] device veth0_vlan entered promiscuous mode [ 300.237761][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.246798][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 300.258392][T10345] device veth1_vlan entered promiscuous mode [ 300.302072][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 300.312020][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 300.363724][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 300.373649][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 300.399624][T10345] device veth0_macvtap entered promiscuous mode [ 300.421814][T10345] device veth1_macvtap entered promiscuous mode [ 300.466235][T10345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 300.477295][T10345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.487308][T10345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 300.497812][T10345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.507733][T10345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 300.518237][T10345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.528162][T10345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 300.538692][T10345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.552824][T10345] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 300.562247][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 300.571836][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 300.581340][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 300.591368][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 300.612946][T10345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 300.623890][T10345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.633990][T10345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 300.644592][T10345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.654620][T10345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 300.665216][T10345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.675241][T10345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 300.685840][T10345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 300.700207][T10345] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 300.711987][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 300.722107][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:17:49 executing program 4: 10:17:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x0, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r1, r0) 10:17:49 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:49 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_smc(0x2b, 0x1, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') r5 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xfd, 0x0) r6 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[r2, r3, r4, r5, r6, r0]}, 0x6) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') getsockopt$netrom_NETROM_T4(r7, 0x103, 0x6, &(0x7f0000000100)=0x8, &(0x7f0000000140)=0x4) 10:17:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x2, @remote, 0x1000}, @in={0x2, 0x4e24, @private=0xa010100}], 0x2c) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, 0x0, 0xe0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r5, 0xc0, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000c80)={0x5}, 0x0, 0x0, &(0x7f0000000cc0)={0x1, 0xb, 0x0, 0x3}, &(0x7f0000000d00)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000d40)=0x9}}, 0x10) r7 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r7, 0x0, 0x0) read$rfkill(r7, &(0x7f00000000c0), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x3c}}, 0x0) 10:17:49 executing program 5: syslog(0x2, &(0x7f0000000000)=""/96, 0x60) r0 = dup(0xffffffffffffffff) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000080)="1fada57e12299c24a7a1fcd2a1131c0b581c751a1c7c71e7dd0b4198c9e98575a896b88b205e738041985f5bdc8835b30ca6d7724502beb162aa9923bb592924e041698bf7103577d7c951aea517700bedab0c80cfba5209f7a2fd69137a4278d62f9d472e31383a2075829318a58127d80f74da63a3e022ce8f4fbe647b023b4c96a23b1e07df85f8af6e5e029c7e9abc801cf951b3967ff2790dc99fb6bacbe6e007b3263b22f9", &(0x7f0000000140)=""/185, &(0x7f0000000200)="e378a91119a7841391ed9d25ccda4225af9880953e3e68f3e32a5505562db32ba5e00f79d190cbe2946e5f7b70255af88d94561e8969207c93696e40cd90a9fde14ba7b5348451e0ed0bebd8c12bcd8620c7d68715bed27b01435eb5c43f509043ed0a8367fc1ebad1c26a02adc55b86800f644aad58866274be9c6a3dd32f3847dd0cf8aca90945ae76dfe575bdf47d7202d07c7f2f286b3a7f783f0c291bc1fd4484eab666ca809559c3f4c3646134afc5d6a03e639590c8822038245397c70fc5", &(0x7f0000000300)="2db2ce2b3d7930bf073a66ef56a1920e7e00ccccc59d3769515cd3470046d02681a337f4463b49da3ac5054cb42dcc29d19e81cbebb7effa66967f809cb4bba680dc687116dcd41037dfa203fbcd4dc2e3b23654fd41799cca8b5bf94d9e034b9cdae1c3a5320269898cbfe53618e1", 0x7, r0}, 0x38) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x34, 0x1402, 0x8, 0x70bd26, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x4000840) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) listen(r1, 0x3) syz_genetlink_get_family_id$gtp(&(0x7f00000004c0)='gtp\x00') r2 = socket$isdn(0x22, 0x3, 0x25) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0xc080661a, &(0x7f0000000500)={{0x1, 0x0, @descriptor="e24bbb5adf0778a5"}}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000640)={'nat\x00', 0x0, 0x4, 0x0, [], 0x5, &(0x7f0000000580)=[{}, {}, {}, {}, {}], &(0x7f0000000600)}, &(0x7f00000006c0)=0x50) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000700)=0xffffff00) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$x25(r3, &(0x7f0000000740)="f88bf18bc28db4590ee1d8f757cb5102d4b114a2918c5f6729dc60cadb0b422725869258238c913801468e9646e3413e69a3ba67bc54a1616c250a5aa2b634daaa29d9a46e797cfeff541c7b", 0x4c, 0x4048004, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r4 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000800)=0x400) r5 = syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x59, 0x0) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000880)) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$DRM_IOCTL_INFO_BUFS(r6, 0xc0086418, &(0x7f00000008c0)={0x11ff, 0x5, 0xff, 0x8, 0x4, 0xde}) recvfrom$rose(0xffffffffffffffff, &(0x7f0000000900)=""/84, 0x54, 0x2000, &(0x7f0000000980)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6, [@default, @default, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x40) [ 301.757677][T10624] bond1 (unregistering): Released all slaves 10:17:50 executing program 4: 10:17:50 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x0, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r1, r0) 10:17:50 executing program 4: 10:17:50 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, &(0x7f00000009c0)={0x5, 0x70, 0xff, 0x40, 0x0, 0x81, 0x0, 0x0, 0x40022, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8000, 0x2, @perf_config_ext={0x1, 0x5c}, 0x4018, 0x81, 0x16a, 0x4, 0x6, 0x8001, 0xcc8}) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c4605813f1f6235000000000000020003000300000030000000000000004000000000000000b80300000000000002000000df0d38000200c200400a0300040000000200000000000000000000e004000000000000000400000000000000000000800000000022980000000000000000000000000000e79cb8971b0607c97af844c51e22eecade8dfbf5fdda84960548b81cb2d4e480a4c6ffe59c97f1eca6e3610502f51f86a9de3b165859bad87306df0eead24de34a4b15d750c8b818a42d4bb7447309514032f822b3797be76e1df7772ade2da1b969ee31084348ceaf3a2003becd01f8640c809a4de36fc180abaeff62783963fe1bddb2e2c43d2299c8c46f19699f82fd52eef1f289a40bd84c882bd4432f3bce9ff82bdf823d7124ec94b73daef62a341b3d9e29efc567be9f25c3021918188255fec8c51e1c47ad0f61f87bc1d9ddab52262e510bbeb429fc0d53912fbc888452cfc38f2a76074c6967e5f32b81aa7c09e779a5bd917abd12d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00"/2419], 0x973) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r2 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x3) setresuid(0x0, r3, 0x0) ioprio_get$uid(0x0, r3) 10:17:50 executing program 3: 10:17:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r1, r0) 10:17:51 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:51 executing program 4: 10:17:51 executing program 3: 10:17:51 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x18200) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') dup(r3) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000140)=ANY=[@ANYBLOB="80a69a6afcf7aee3ad9a9a47a8bb51a743bdb3d47d23e972a38e4966bf7e9e8b92ff3f05bd0e20935caf777f000000", @ANYRES32=r1, @ANYBLOB="0000000000000000000001000040000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000100000000000040000000000000", @ANYRES32, @ANYBLOB="000000000000010000000000000000f0ffffffff", @ANYRES16=r4, @ANYBLOB="0500"/14]) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r5, 0x541c, &(0x7f0000000000)) [ 302.997214][T10723] IPVS: ftp: loaded support on port[0] = 21 [ 303.659768][T10723] chnl_net:caif_netlink_parms(): no params data found [ 303.861426][T10723] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.869054][T10723] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.879134][T10723] device bridge_slave_0 entered promiscuous mode [ 303.894850][T10723] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.902454][T10723] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.912445][T10723] device bridge_slave_1 entered promiscuous mode [ 303.952452][T10723] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 303.966397][T10723] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.013759][T10723] team0: Port device team_slave_0 added [ 304.023485][T10723] team0: Port device team_slave_1 added [ 304.061895][T10723] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 304.069369][T10723] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.095992][T10723] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 304.112577][T10723] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 304.120121][T10723] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.148335][T10723] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 304.255517][T10723] device hsr_slave_0 entered promiscuous mode [ 304.298421][T10723] device hsr_slave_1 entered promiscuous mode [ 304.337762][T10723] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 304.345376][T10723] Cannot create hsr debugfs directory [ 304.572195][T10723] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 304.614656][T10723] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 304.663203][T10723] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 304.703272][T10723] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 304.869565][T10723] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.895715][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.905373][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.922801][T10723] 8021q: adding VLAN 0 to HW filter on device team0 [ 304.940808][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.950966][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.960656][ T8631] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.968121][ T8631] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.984922][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 305.004162][T10253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 305.014221][T10253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 305.023940][T10253] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.031809][T10253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.082347][T10253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 305.092547][T10253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 305.103937][T10253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 305.114084][T10253] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 305.124567][T10253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 305.135568][T10253] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 305.145918][T10253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 305.155836][T10253] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 305.172712][T10253] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 305.192276][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 305.202148][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.224677][T10723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 305.272499][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 305.280421][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 305.309839][T10723] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 305.420809][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 305.431080][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 305.485732][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 305.495151][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.506252][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.516349][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.533980][T10723] device veth0_vlan entered promiscuous mode [ 305.553938][T10723] device veth1_vlan entered promiscuous mode [ 305.580795][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 305.589594][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 305.634778][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 305.646797][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 305.664606][T10723] device veth0_macvtap entered promiscuous mode [ 305.685417][T10723] device veth1_macvtap entered promiscuous mode [ 305.715968][T10723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 305.727027][T10723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 305.738184][T10723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 305.748980][T10723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 305.759120][T10723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 305.769845][T10723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 305.780111][T10723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 305.790702][T10723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 305.800731][T10723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 305.811694][T10723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 305.824726][T10723] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 305.835640][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 305.845000][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 305.854485][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 305.863882][ T8631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 305.885013][T10723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 305.895873][T10723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 305.906982][T10723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 305.917582][T10723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 305.927787][T10723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 305.938383][T10723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 305.948707][T10723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 305.959334][T10723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 305.970118][T10723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 305.980834][T10723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 305.993941][T10723] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 306.035199][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 306.045768][ T51] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:17:55 executing program 5: 10:17:55 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r1, r0) 10:17:55 executing program 4: 10:17:55 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:55 executing program 3: 10:17:55 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0185647, &(0x7f0000000080)={0xf29ffff, 0xe6d4, 0x1383, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x980911, 0x10001, [], @value=0x2}}) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x44}) 10:17:55 executing program 4: 10:17:56 executing program 3: 10:17:56 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$nvram(0xffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0xc00c1, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r3 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r4, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x3f, 0x1, 0xf6, 0x80, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x10, 0x9, 0x0, 0x7, 0x3, 0x0, 0x4}, r3, 0xd, r4, 0x2) setsockopt(r2, 0x4, 0x5, &(0x7f0000000040)="c644d8dc076b3c667b9a4b9370b627299ebdff90b94fe74eee6a93680986e20857c2a2b9597cd727abcfeebba0854004", 0x30) 10:17:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r1, r0) 10:17:56 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:56 executing program 5: 10:17:56 executing program 3: 10:17:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 10:17:56 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x304) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffff8368eb58687530000000810000000806000108080604"], 0x32) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:17:56 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:56 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x2}}], 0x2, 0x24004880) 10:17:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x0, 0x12, 0x0, 0x0, "30385c45dc8772699dd0d396316fb2245b0aa3191f823eb27525927656fe7a2065c8e5f33155ab397e712aaca0df059c608afcd05154fc823234a1a562e96841", "3626e39666d41a3609a058b1525e95514ff72686ffafbe78a2f7d70486689151"}) 10:17:57 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 10:17:57 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:57 executing program 5: r0 = gettid() r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x41) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) prctl$PR_SET_PTRACER(0x59616d61, r0) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 10:17:57 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 10:17:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x30, 0x6, 0x658, 0x398, 0x468, 0x0, 0x398, 0x2c8, 0x588, 0x588, 0x588, 0x588, 0x588, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'syzkaller1\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x10}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:pam_console_exec_t:s0\x00'}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@mcast1, @private2, [], [], 'ip6gre0\x00', 'tunl0\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, [], [], 'ipvlan1\x00', 'ip6gre0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) 10:17:57 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) [ 309.503217][T11039] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 10:17:58 executing program 5: pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) bind$vsock_stream(r0, &(0x7f0000000080), 0x10) msgctl$IPC_SET(0x0, 0x1, 0x0) write(r1, &(0x7f0000000340), 0x41395527) open(0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x7, &(0x7f0000000180)={0x0, 0x0}) write(r2, &(0x7f0000000340)="df", 0x1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x800000) 10:17:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)) dup2(0xffffffffffffffff, r0) 10:17:58 executing program 4: ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00000003c0)=""/253, 0x12f, 0xfd}, 0x20) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000040)) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 10:17:58 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {&(0x7f0000000800)}, {&(0x7f00000003c0)}], 0x4}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') 10:17:58 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)) dup2(0xffffffffffffffff, r0) 10:17:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)) dup2(0xffffffffffffffff, r0) 10:17:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x1, 0x20007, [{}]}]}}, &(0x7f0000000000)=""/252, 0x32, 0xfc, 0x8}, 0x20) 10:17:59 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:59 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=@get={0xe8, 0x13, 0x0, 0x0, 0x0, {{'lrw(camellia)\x00'}}, [{0x8}]}, 0xe8}}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x2}}], 0x2, 0x24004880) [ 310.929834][T11082] BPF:[1] DATASEC (anon) [ 310.934398][T11082] BPF:size=131079 vlen=1 [ 310.939110][T11082] BPF: [ 310.941923][T11082] BPF:Invalid btf_info kind_flag [ 310.946955][T11082] BPF: [ 310.946955][T11082] [ 311.099147][T11082] BPF:[1] DATASEC (anon) [ 311.103709][T11082] BPF:size=131079 vlen=1 [ 311.165129][T11082] BPF: [ 311.168106][T11082] BPF:Invalid btf_info kind_flag [ 311.173077][T11082] BPF: [ 311.173077][T11082] 10:17:59 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r0, 0xffffffffffffffff) 10:17:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000003dc0)={0x80, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x4}, @CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @private1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x80}}, 0x0) 10:17:59 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:17:59 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000400)={'syzkaller1\x00', {0x7}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa8100000086dd609faa9800442f"], 0x1) bind$inet6(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:18:00 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r0, 0xffffffffffffffff) 10:18:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) 10:18:00 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, 0x0, 0x0) 10:18:00 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) dup2(r0, 0xffffffffffffffff) 10:18:00 executing program 3: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x06') r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r3, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000100)='keyringeth1\x00'}, 0x30) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x52, 0x9, 0x3, 0x40, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000004c0)}, 0x80, 0xd2, 0x800, 0x6, 0x2, 0x7, 0x9}, r3, 0x4, r2, 0x1) getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000040)='./file0\x00', r4}, 0x10) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x70, 0x4, 0x0, 0x79, 0x2, 0x0, 0xffffffffffffffff, 0x10, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x3}, 0x0, 0xfffffffffffffffb, 0x1000, 0x0, 0x800, 0x1, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0xf06456905a545522, 0x70, 0x0, 0xff, 0xc9, 0x0, 0x0, 0x0, 0x20173, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffeff}, 0x9901, 0x0, 0x719, 0x8, 0x0, 0x7fff, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) close(r1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f00000003c0)="479dabcd191c42634f5d04bf8fcafe645bd6f3b88bfdb06ef8367cd262979abf60892fb694e6d692654aa6649f71317f1933e4acde9afada8c79343bb5387b2be2602d45b1fbd2ab9884ecfe2c1c985960aee1324079ef3c455dcf646d9df662c9fd55a23343ebba67534447d3ec6d93ff7c670ee7d09410aa5d872ed354b3cb3780356690b884b43d84668d78091ee1"}, 0x20) 10:18:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f000000e300)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000000008bc609f6d804feffbaffe3ffff9e00000000", 0x22}, {&(0x7f00000003c0)='8', 0x1}], 0x2}, 0x0) 10:18:01 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, 0x0, 0x0) 10:18:01 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) 10:18:01 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000002dc0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U#\x83\xbd\x00\xd9]\x91\xb5\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x03\x00\x00\x00\xf5\\\x9b\xb2\a\x84\xb5:f\xcb\xd2\x8a\xd5\x8f\x11\xd0\x85\xc4P?\v\xc8\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaa\x04\x00\xdd2\xe0\xff\xff\xff5\x98\xfe4*@\xe3\x86(\x06V`\xa6o4x[\xdc\xdbd\xf1M\'\x82L k\xf5\xee+\xe4\x9b\xed\xa8Yz\x7f\xa4\xa3\x98\xc6\n_\xcdq\xe5\xec\b\xd5\xbd\xaejn\xd9\xd7\xa36;C\x066\xc4\xe3\xa5\x98\x80\xbbE]\x972.\x9a\xafh\x12\xd8B:\xeb}\a\x05k\x9b\x0fHz\x98@\'=\xc8\xca\x80x\x1a\xaffa\xb96$\xb2\xe3}\xa8\x9f\xd5\xa0\xba\xcfJ\xdf\x1a\vv\xe7*\x15\x9dbq(\x1bg%\xc1\x1f\xee\xbf\x84n/\x886\xa9\x11e;ojP\xe0\xbe{0k5N') 10:18:01 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x300, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x13000003, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x780f8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000003c0)={&(0x7f0000000780)="136f81ad5a0a607c874d427c28198d013be9d4eed5e63954c810b648bf9c13712a8ce7fc61daacf439b00c7875e907416bd97fe91e0b2c88c51d84893a5f6944c0287fa3e9e5508a97c15d00440951d2ff10c7a4faf54ab99c36ceec869992592e0417", &(0x7f0000000180)=""/20, &(0x7f00000002c0)="0dac9012ef8eb99282a336fc7226e2a0990cb458cb3aca1f80c86d5845c1e685afe63eb1ff2e81faaf67d9ea01dbfd5698c5a5d664b9ac7a41152d0b3c50e459821b24fa21dd263879520d647b9e24f7f47e4c3137d4437661564d8f4a9064b531", &(0x7f0000000340)="8aa24918ce7f0b37817a7cbd31eb7ed3314c8d4a6ee61ac647cbee60fabcb6f14824e43585a6c562fa71eeec5eb1d322f0057bb55a8c7317302c9d5a1f8b577d7eaf2207e0c06493c3f79ce56bd338e5d13b18868549c92ee099762608e9b42ca329948a821ad6bac47d", 0x54a89a79}, 0x38) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000780)}, {&(0x7f0000000840)}], 0x3}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x6, 0x0, 0x0, 0x80, 0x1, 0x7f, [], 0x0, 0xffffffffffffffff, 0x2}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00y.\xfc*_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7f\r\xb2\xcf\x8a\xc9(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0-\x96\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x0, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:02 executing program 4: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x2, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x2, 0x1, &(0x7f00000000c0)={0x0, r1+10000000}, 0x0) [ 314.019848][T11158] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 314.521070][T11155] Y­4`Ò˜: renamed from lo 10:18:03 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x0, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:03 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000200)) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000080)) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000004c0)=0x0) r3 = eventfd2(0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000600)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x3, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r3}]) io_destroy(r2) r4 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) r6 = openat$dlm_control(0xffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x20, 0x0) sendto$packet(r6, &(0x7f0000000140)="a8ab2c9d1bb7b6bee65f614ef27c012667ad5abff51ebf999063e26fb6bdd84c18de1718e61a4e30a752686d4a01f46e2f4fa954dec76beeb3b81bd5c6f80134e138e2896eccf57dbea9f88f9f80a6879a43d76fd7c5b2d20dc76f9b418a0a13a0e0298f6ce042ced5791fb9091c2496f703a7fce1584f9dbd7ac2e51bed81d5cc0f807de0bc942fd594c2ec2c33676380f8d77214f088f87bbb51ddb642f0a4f9e63b4b1ffd522506cca461ef3b42365b0cd32cf3e6", 0xb6, 0x4048014, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f00000000c0)={r5}) 10:18:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/144, 0x90}], 0x1, 0x5) 10:18:03 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x300, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x13000003, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x780f8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000003c0)={&(0x7f0000000780)="136f81ad5a0a607c874d427c28198d013be9d4eed5e63954c810b648bf9c13712a8ce7fc61daacf439b00c7875e907416bd97fe91e0b2c88c51d84893a5f6944c0287fa3e9e5508a97c15d00440951d2ff10c7a4faf54ab99c36ceec869992592e0417", &(0x7f0000000180)=""/20, &(0x7f00000002c0)="0dac9012ef8eb99282a336fc7226e2a0990cb458cb3aca1f80c86d5845c1e685afe63eb1ff2e81faaf67d9ea01dbfd5698c5a5d664b9ac7a41152d0b3c50e459821b24fa21dd263879520d647b9e24f7f47e4c3137d4437661564d8f4a9064b531", &(0x7f0000000340)="8aa24918ce7f0b37817a7cbd31eb7ed3314c8d4a6ee61ac647cbee60fabcb6f14824e43585a6c562fa71eeec5eb1d322f0057bb55a8c7317302c9d5a1f8b577d7eaf2207e0c06493c3f79ce56bd338e5d13b18868549c92ee099762608e9b42ca329948a821ad6bac47d", 0x54a89a79}, 0x38) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000780)}, {&(0x7f0000000840)}], 0x3}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x6, 0x0, 0x0, 0x80, 0x1, 0x7f, [], 0x0, 0xffffffffffffffff, 0x2}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00y.\xfc*_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7f\r\xb2\xcf\x8a\xc9(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0-\x96\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x2, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x2, 0x1, &(0x7f00000000c0)={0x0, r1+10000000}, 0x0) 10:18:05 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) 10:18:05 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) r2 = openat$cachefiles(0xffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x800, 0x0) lseek(r2, 0x100000, 0x2) r3 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000080)={0x7ff, 0x8001, 0x8, 0x80000001, 0x0, "bc3712c01a884691fb4c14ec0774a450cae271", 0x4, 0xfff}) ioctl$SNDCTL_DSP_GETISPACE(r1, 0x8010500d, &(0x7f0000000040)) 10:18:05 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x0, 0x800000000000004, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:05 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="73657373696f6e3d3078303030303030303030303030303030302c666f7263652c63726561746f723dec452717"]) 10:18:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4045, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x600) ioprio_set$pid(0x2, 0x0, 0x2007) sendfile(r2, r3, 0x0, 0x10003) [ 316.792535][ T31] audit: type=1804 audit(1595326685.199:14): pid=11213 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir353528831/syzkaller.ePXsgS/15/file0" dev="sda1" ino=15952 res=1 [ 316.889985][T11219] hfsplus: unable to find HFS+ superblock 10:18:05 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x0, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) [ 316.952086][T11219] hfsplus: unable to find HFS+ superblock 10:18:05 executing program 1: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) 10:18:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:05 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x0, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) [ 317.431429][ T31] audit: type=1804 audit(1595326685.839:15): pid=11213 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir353528831/syzkaller.ePXsgS/15/file0" dev="sda1" ino=15952 res=1 10:18:06 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x0, 0x8, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:06 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000180)=""/4082, 0xff2}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x0) 10:18:07 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) 10:18:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, &(0x7f0000000100)="d48596307fe4abeec88f799d7c9f3915a4e90d6b1773a36a5f69dbe948fc3575214a509cc82e50e332ec82de6977d761c986f7514d79189bc37d5eb81be7d8adce37c463746df1ed67bdb211688077fe8be3a52c5cd93565f971f2913aa84f145eefcfe1c331fb3da8f1d8e289080deb0e83b35ab5f20485d29239f6776de269549b59a0de475187cb16e91b270cb7e9ff33dca03a95a455f64fe63885610540759a6ecc33aca1806fe803984ca6e8210469121a55d17ddd43b54de0c0112b0c75449a9b8cf917a4b346d565cff85415e7415d3f5297fac0f8545c56a358f37a14faf14e52a5cd88b6ddfb289fa2eddb9eb366bd52ae999ac2b27e7f02f7bb68f9a53d5d0c6264765a21aea97713aee8f673811462ac9e8f84762347e3f30bef1c35dc7b5e62cf6df98390daefd7fe2754a1d6266d264dab198e381b564e2fae558e10f5debf91d37678222100a9bd863decfef3c2b8bbb8ddd5f811eb6dda5cd805d2ae2ffbdc400c0911972a66cf58941a92d86bdf5080dd5610e10cc8befc9742cb33d7051c23eb50c4f019df9bd481dc68ea832a46a0583358aeb4de3cc373938f45ffffecb06579264b338575a9ceb11340a2fb6f12310f42d7058a88e0d5f1362c5ea5e322199aa24ba1c6383e92e48029e7ab654c626fc7df320a22ce2066c14c837b747d9b83cb241bcc0d5cf53145bdbe56a6e77d5972d42773b630e51933f7876711f1fed05581855fca130987dfbc8ac969a5fcdcaf88960cc9bba2d8c7c38e7c2d68b092b1eb8e2d4d07424d55922f6a4c451eb3257aa17cc2a9ad50e3d36c07136de1f02d63d256606cacf7be09eb5917533251b89e804aff920cd41c7dd86da68448577374b024827f45e671e921d3663ca9e8f35a945fdcf1a3e4b65a07bbc2836c5f357a58e42987828f9319adefa0dfa04908dfd7f18d6a0b4640dd577418ae5d0b44c12e2bdcc8a719c0eb1e3464e622580a61f48299d3989d92d6729d3917030af2cbe012759764894ceb1f632bb6b452901ab884308dd9ec855f71393330634b8beeeceaf42102fc07fce127d16bcd81bc5186210c82f764fd786a5fd715cf81f1bf7a1094bb99f73389c9044555a74cb11693b06c4057a3236bb5a16e1cebd2427f81ea22b1fd00171a5b883c25bc0de8554382a86202349ba837fdf3032319dcc41c8e58605c140d368106a1d61f6070305a8dbe5a12e954ca6c50cf7275e1fb30b22e33f5058ee87f2a77fd2bfa6b9f5767bc149fb42161cf4bf1405fc03ac2e332928630927a0a24815466dc12a57b8cc987937f16938471d93ec31757c36b09889577cb5609390396122df684561c302f0887b5cd79c7f0e7fb7471f034ef34c7c3db2eed2b76fdb6c31d166e14ebff939e0e0dd92fbc23f03b8616067942a9f95458b26a42d6088ab7d98c63bcf93fcc29ad67"}) 10:18:07 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x0, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2ef6bf121f64080080840025dc2baffe6ae2d7dcdadc730000"], &(0x7f0000000180)='GPL\x00'}, 0x48) r1 = openat$proc_capi20(0xffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x8400, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000200)=""/74) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000000c0)={0x1b, 0x1f, &(0x7f0000000740)="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"}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r2}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r2}, 0xc) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 10:18:07 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)) 10:18:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000370000216a0a00fe002000008500000027000000b7000000200000009500000000000000d10d633a8c36bbeb0000762373a7024f6d40c9b8c7da0ace992546daa595a6e42e09d24a3e8cbb7c84f39c355543248936043a9e60c287094edf3495a3d5ff55422c242ab67c1911f25ad1eec24cde2260a146967c385c3bf2e0e7997125132380605f9840e41854f100002e88a3e1507ba3872c4096104e4f4c693cc6d690c2e28757adf0e3a62c23c42880366f2834cfb448a531fb0bfbae11b2f84050b2d35b6ad44a27e97df1a24e86b2d61db560c34ddf60b4861953c158d065c4cb0fe4a089e876e535188de88a16f36e4afe0f9ecc7dc90f330eb9ea0f9d4e808768000000000000000000000000000000f58d8fc7ed414cf41ab8ffafef93038b2d9a9aed8b3e58988a166bc594f20414e21c75c762102f9a5e352ce0aded2a393c03e69eb9da94d691c2e2c5c39d9d03b3bb1aaad7b40fd5eca433e8fada3e05dbefb69096fab2a58cef1248763e93dd3022b1894c8fbec8bdfd814001b97e418b0d1efd279ed2342af1b86431fca9dd18c960b07d92a6c0d49ecb97e51957522c28978a24330a17310dbafd416a59307bee1e345a69caffecffd574e5f41676e8de9612d23b5fe9b3b4d323999dd53deea1021b1710ac666c05f2df2054103ad3343b26c548f57d8e22c0b9d2d78200887b31bdc2941d83317eb13bc8d10352bf01668ebcca48ea1483a5a640b9bd2d4db0ffd382546976de971b117ee70bffe611cb6338a3a61d53b651b04cc0df558e57d5102cebebd953fdd8eacb00ba18f33bfdea28200b810ad14fecfee47798bb8b654852b7f72bdf71a8c529e9fad69388b54c6f0d35dcabd35d7879ee78ed"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x10, 0xfe92, &(0x7f0000000140)="a673f3ce05f1a282eeab0500000800f08102e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x400, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 10:18:08 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x0, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:08 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x44182) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4021, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x10\x01\x00t\xb3-\rG|\x00\x00\x00\x00\x00\x00\xad\x8d\x00\x00\x00\x00\x00\x00\x1e\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001e00)=[{&(0x7f0000000600)='0', 0x1}], 0x1, 0xfff) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x12, 0xa, 0x0, 0x0) r4 = socket(0x0, 0x800000003, 0x0) write$P9_RSETATTR(r3, &(0x7f0000000140)={0x7, 0x1b, 0x1}, 0x7) ioctl$sock_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000100)) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000600)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00'}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {0x17e}, 0x2ec, {}, 0x0, 0x1, 0x1c, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "5244534b0f00000d574556820000a482ebf7888c305bee6fd600"}) 10:18:08 executing program 2: r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) 10:18:08 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x0, 0x2, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:08 executing program 2: r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f0000000040)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) 10:18:10 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) 10:18:10 executing program 3: ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:10 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000001dc0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="2e00000010008108040f9becdb4cb92e0a48b1371400000069bd6efb2503eaff0d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) 10:18:10 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x0, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:10 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vga_arbiter(0xffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x54501, 0x0) socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r1, 0xa5a27f2e7ede6595, 0x0, 0x0, {}, [{@nsim={{0x38, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x3}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000800}, 0x80) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r1, 0x4, 0x70bd2d, 0x25dfdbff, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x3f}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}]}, 0x60}, 0x1, 0x0, 0x0, 0x8014}, 0x800) r3 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x541c, &(0x7f0000000000)) 10:18:10 executing program 1: socket$inet6(0x10, 0x80000, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @local}}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380)=0x3, 0x12) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x2c, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}]}, 0x2c}}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000440)={0x2, 0x4e23, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) writev(r2, &(0x7f0000000300)=[{&(0x7f00000018c0)="9eb8ced09fcd5112112b36193276f77abc3f1e958a466273b2fd50ca4565f863bc01b26a28d65e7444a7662ec2e9d49b0b000720c2947851077545", 0x3b}, {0x0}], 0x2) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x8}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000140)=""/165, 0x1000000eb) [ 321.896301][T11333] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:18:10 executing program 3: ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:10 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x0, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) [ 322.205290][T11330] device batadv0 entered promiscuous mode 10:18:10 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x8, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$sequencer2(0xffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x432001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'vxcan1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000003c0)={r2, 0x1, 0x6, @random="eb1335ca5769"}, 0x10) r3 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f0000000080)=0x800) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:10 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000001dc0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="2e00000010008108040f9becdb4cb92e0a48b1371400000069bd6efb2503eaff0d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) 10:18:10 executing program 1: 10:18:10 executing program 3: ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, &(0x7f0000000100)="d48596307fe4abeec88f799d7c9f3915a4e90d6b1773a36a5f69dbe948fc3575214a509cc82e50e332ec82de6977d761c986f7514d79189bc37d5eb81be7d8adce37c463746df1ed67bdb211688077fe8be3a52c5cd93565f971f2913aa84f145eefcfe1c331fb3da8f1d8e289080deb0e83b35ab5f20485d29239f6776de269549b59a0de475187cb16e91b270cb7e9ff33dca03a95a455f64fe63885610540759a6ecc33aca1806fe803984ca6e8210469121a55d17ddd43b54de0c0112b0c75449a9b8cf917a4b346d565cff85415e7415d3f5297fac0f8545c56a358f37a14faf14e52a5cd88b6ddfb289fa2eddb9eb366bd52ae999ac2b27e7f02f7bb68f9a53d5d0c6264765a21aea97713aee8f673811462ac9e8f84762347e3f30bef1c35dc7b5e62cf6df98390daefd7fe2754a1d6266d264dab198e381b564e2fae558e10f5debf91d37678222100a9bd863decfef3c2b8bbb8ddd5f811eb6dda5cd805d2ae2ffbdc400c0911972a66cf58941a92d86bdf5080dd5610e10cc8befc9742cb33d7051c23eb50c4f019df9bd481dc68ea832a46a0583358aeb4de3cc373938f45ffffecb06579264b338575a9ceb11340a2fb6f12310f42d7058a88e0d5f1362c5ea5e322199aa24ba1c6383e92e48029e7ab654c626fc7df320a22ce2066c14c837b747d9b83cb241bcc0d5cf53145bdbe56a6e77d5972d42773b630e51933f7876711f1fed05581855fca130987dfbc8ac969a5fcdcaf88960cc9bba2d8c7c38e7c2d68b092b1eb8e2d4d07424d55922f6a4c451eb3257aa17cc2a9ad50e3d36c07136de1f02d63d256606cacf7be09eb5917533251b89e804aff920cd41c7dd86da68448577374b024827f45e671e921d3663ca9e8f35a945fdcf1a3e4b65a07bbc2836c5f357a58e42987828f9319adefa0dfa04908dfd7f18d6a0b4640dd577418ae5d0b44c12e2bdcc8a719c0eb1e3464e622580a61f48299d3989d92d6729d3917030af2cbe012759764894ceb1f632bb6b452901ab884308dd9ec855f71393330634b8beeeceaf42102fc07fce127d16bcd81bc5186210c82f764fd786a5fd715cf81f1bf7a1094bb99f73389c9044555a74cb11693b06c4057a3236bb5a16e1cebd2427f81ea22b1fd00171a5b883c25bc0de8554382a86202349ba837fdf3032319dcc41c8e58605c140d368106a1d61f6070305a8dbe5a12e954ca6c50cf7275e1fb30b22e33f5058ee87f2a77fd2bfa6b9f5767bc149fb42161cf4bf1405fc03ac2e332928630927a0a24815466dc12a57b8cc987937f16938471d93ec31757c36b09889577cb5609390396122df684561c302f0887b5cd79c7f0e7fb7471f034ef34c7c3db2eed2b76fdb6c31d166e14ebff939e0e0dd92fbc23f03b8616067942a9f95458b26a42d6088ab7d98c63bcf93fcc29ad67"}) 10:18:11 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:11 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x0, 0x88, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:11 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x17, 0xdd6, 0xcf58, 0x3, 0x422, 0xffffffffffffffff, 0x6, [], 0x0, r1, 0x2, 0x2, 0x2}, 0x40) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000100)={0x21, 0x37, 0x2, {0x2, 0x7c, 0x9, r3, 0x3, '\xf9/^'}}, 0x21) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000040)={0x4, 0x1f, [{0x3f}, {0x4, 0x0, 0x9}, {0x6, 0x0, 0xc9}, {0x20, 0x0, 0xffff}]}) lseek(r0, 0x0, 0x0) r4 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x541c, &(0x7f0000000000)) 10:18:11 executing program 4: 10:18:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:11 executing program 1: 10:18:12 executing program 1: 10:18:12 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:12 executing program 4: 10:18:12 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:12 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x3f, 0x0, 0x401}) lseek(r1, 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000040)={0x4, 0x9, 0x4, 0x2}) 10:18:12 executing program 1: 10:18:13 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) 10:18:13 executing program 4: 10:18:13 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:13 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) 10:18:13 executing program 1: 10:18:13 executing program 1: 10:18:13 executing program 4: 10:18:14 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:14 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:14 executing program 4: 10:18:14 executing program 1: 10:18:15 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) 10:18:15 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 10:18:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, 0x0) 10:18:15 executing program 4: 10:18:15 executing program 1: 10:18:15 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1004000000016) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r0, 0x0, 0x4, &(0x7f0000000040)=',)\'\x00', r3}, 0x30) r4 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:15 executing program 4: 10:18:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, 0x0) 10:18:15 executing program 1: 10:18:15 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x40) 10:18:15 executing program 4: 10:18:16 executing program 1: 10:18:17 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) 10:18:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, 0x0) 10:18:17 executing program 4: 10:18:17 executing program 0: 10:18:17 executing program 1: 10:18:18 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000040)=0xed) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000080)={0x3, 0x9, 0x0, 0x0, 0x200}) 10:18:18 executing program 1: 10:18:18 executing program 4: 10:18:18 executing program 0: 10:18:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x195, &(0x7f0000000400)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:19 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video36\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000380)={0x8000}) 10:18:19 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:19 executing program 1: r0 = gettid() r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x41) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 10:18:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:19 executing program 2: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r2, 0xa5a27f2e7ede6595, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x3}}]}, 0x58}}, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0xfffffffffffffea3, r2, 0x8, 0x70bd2a, 0x25dfdbfd}, 0x18c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r3 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x541c, &(0x7f0000000000)) 10:18:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000300)=""/13, 0x5}], 0x3, 0x0, 0xfffffffffffffe23, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe7, &(0x7f0000000140)="f7f249b9740c9e57f4f22a160500000032a5b60a00008024c30e478947d190ac00000000000000000000000000000000663697ba4ecb40a2f32e32a3b88aaf2406f4970e85a63c9a4b0d8b9aad9c9ba4c998db2f7155d302a7be122bb1609f8b0164eb0b027a0200169c864e1d5f8179cba2e431126de0592738cb993815a7d1b1ce34144ce1487e311e84395a80adbe3e7f3622703c353de8e6928bfd5a5f2cc05e4b942d6ed155b67a555f4b2e2b0cd0e93e41c330f70401e3d96f546e65fab4fae51bb32a6f3ca61632d15b0c1cec89839cfe12dc71fc89e68691b62f6ffd799917811fb12f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="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"}) 10:18:20 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x145080) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x406, r3) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') ioctl$BLKROSET(r5, 0x125d, &(0x7f0000000100)=0x3) ioctl$PPPIOCSMRRU(r5, 0x4004743b, &(0x7f0000000180)=0x800) bind$isdn(r4, &(0x7f0000000040)={0x22, 0x1f, 0xff, 0x8, 0x9}, 0x6) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000680)={0x2, 0x6}) r6 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r6, 0x0, 0x0) ioctl$KDFONTOP_COPY(r6, 0x4b72, &(0x7f0000000600)={0x3, 0x0, 0x14, 0x20, 0x12a, &(0x7f00000001c0)}) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x17, 0xdd6, 0xcf58, 0x3, 0x422, 0xffffffffffffffff, 0x6, [], 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2}, 0x40) sendfile(0xffffffffffffffff, r5, &(0x7f0000000640)=0x3, 0x7) 10:18:20 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000840), 0x0, 0x0, 0x0, 0x20000001}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)='ip6tnl0\x00') 10:18:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, 0x0}) 10:18:20 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:22 executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 10:18:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, 0x0}) 10:18:22 executing program 4: r0 = gettid() r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x41) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x191) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 10:18:22 executing program 1: memfd_create(&(0x7f0000000380)='\x81\x02\x01N!\xdd\x1f\x80\v\xbc\x17\x8ao\x84\xce\xebT\xe8\xfa!P\rB\x05(\xf7\x80\x00\x00\x00ze\xf8\xb0\x1al\x0f\xa1\xd3\x1c@\xcb\xd0:\x83\x1a\xadv\x17\r,a\x0f\xe3\x12\x1d\xca\x05\x9e\x03|9\xe7\x19*\xba-i\xbf\xa8[\x8e\xdfh\xa6\x96\xdb\xb5\xb3\xd5\xeb\x99\xb4kO-\x8fxQbg\r1\x9fb\xfeC\xa5\x18\xcb\x8a\xff\xcd\xed 2\xfd$\x9b\xc3X,Hl\xb5\xeb3\x11\xfd\xd2uF&\xb6\xa2\xd1\x1d\x9d(\xd7e\x1e\xba\x18Ha\x0f\x1dvQ\x8d\xa4sV8=\xb7%|t\x9fC[\xb6q\xc8L\a_z\x1b\x89\x88\xbe\xadZs\x9fg\xf3\x90\x03\x95\xcf.AV,\xa2,\x87\xd9\xfd\\]\x87+\xe3\xf9\xad\xa9+u\xbb\xa2', 0x0) mlock(&(0x7f0000000000/0x4000)=nil, 0x4000) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) 10:18:22 executing program 2: r0 = openat$mice(0xffffff9c, &(0x7f0000000140)='/dev/input/mice\x00', 0x200000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060400, 0xfffffffffffffffb}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x0, {0xa, 0x4e26, 0x208, @mcast2, 0x2}}}, 0x38) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000200)=[@in6={0xa, 0x4e21, 0x3ff, @private0={0xfc, 0x0, [], 0x1}, 0x80}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f00000003c0)={'erspan0\x00', 0x81}) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000080), &(0x7f0000000280)=0x18) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000040)={0x59, 0x1, 0x208, 0x0, 0x0, 0x2, 0x7, 0x80000000, r6}, 0x20) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x541c, &(0x7f0000000000)) syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0)='NET_DM\x00') 10:18:22 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x1e, 0x0, 0x0, 0x0}) 10:18:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 10:18:22 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x1, @link_local, 'ip6gretap0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 10:18:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r3, 0xffffffffffffffff, r2, 0x0) 10:18:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x28}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) 10:18:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x8188aea6, &(0x7f0000000100)) 10:18:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x1, @link_local, 'ip6gretap0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 10:18:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x81a0ae8c, &(0x7f0000000100)) 10:18:23 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000040)={0x8, 0x400}) 10:18:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0xb) ptrace$cont(0x4, r2, 0x0, 0x0) 10:18:24 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000000000/0x400000)=nil, 0x400000}, 0x2}) clone3(&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 10:18:25 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:25 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:25 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x45c) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) close(r0) 10:18:25 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 10:18:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_vs\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x0) 10:18:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @remote, 0x0, 0x1, 'dh\x00'}, 0x2c) [ 336.897614][T11665] input: syz1 as /devices/virtual/input/input6 [ 337.055001][T11681] input: syz1 as /devices/virtual/input/input7 10:18:25 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x3) setresuid(0x0, r2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x3) setresuid(0x0, r4, 0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x4353ba7e, 0x8, &(0x7f0000001600)=[{&(0x7f00000000c0)="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", 0x1000, 0x80000001}, {&(0x7f00000010c0)="b475e332a86848b92917f26e61dd3fc72cca2a01a977a3ed5c255e02af3d4cbe77c6df719b984b4172b861e3b766c10529627b7406a889b29575a6fe6cd4e15372a31701e9e3e763e9eff9e7b3e9ca122dc399c4147256522f4ccd7ce7ca67fa4d5b3326609571efa512620b8e00", 0x6e, 0x6}, {&(0x7f0000001140)="e6cf3f6f3ee4fc389798a51e2d66088cf87ac6ba4d0a7945f5e0e97cf94fde2a1a2c826c88f2bc96a833321eeb0f5a5d849aefaf40840af0b270b34b291141c4a0bb466972f2b20e73d1adb90afd94f0913365ca66fbd33769cf9e0a5ac37bef31dc5a480cd179c297c5ff5bcf71d21238fbc0757b029ff03e4e916f9177e9cc78b968ce8dfee8b9e18be07015519388", 0x90, 0x1ff}, {&(0x7f0000001200)="7d26e59d91681862be20a1c2fa14503932fd72ecf3ff964f5a5e6718abd577681f21f108260b36eb21433c38fa1cd91140ed7f8fcf4a2f41e45060fd14fffd256d1f6b493a0c26d3eec9ddb91a3bfd8b13093f0233c3eff74bccc9b15731ea37a6b151ca4136b990eb7a43ef701b82dec532cf4ea94e7b1cd6d66a6f7a4e73c2df164c951516e9641aa8fe054b405b5148bb226023b2c286f602dc5ae63c8fc68475ee0361b4e8ddb2213546bfc167192c876d5da7ec7e93b0a64c86a9b7af2bc4f8d103bf2f691a960ff4cb24d2e8f5d70a381bc5317b4dda7447d683d2b788ce45", 0xe2, 0x9}, {&(0x7f0000001300)="75696ccaa53b8c581413076cb2384aa899da80b1b4cc6c7430e06a69367adf9f14475c010c9691d0d3b3ca27a7b3b7087e1fbf9390d85ebfd6a032a97c9e81450112b9863e010f893e0a4e48f2d129970489a07388046d4ed8351bc1b17f88db56973c6561562b9321944e7ce2756e8c17e0d0277c183c533fd46a04dd3a93e4a8f128b4066f36f51e77313bddce05d15e33a4d3288144e4ee944bc2aff705ce6b4b106de723541551b96396fefad1c70498f7ecff292563767fbc25372419d9264eaad7cd07f7c0d2d1212ac14a5a", 0xcf, 0xffffffff}, {&(0x7f0000001400)="542e2c945b37d24dd220e43182e14e47d0e326370c4c28e3e0505cff4569c8c8de540488f9f04ba7d046fd3992197beabaed318d2fd8c07b467eb5ed76ba57ac3fa43e25483153f490120bcc33bf289e1a2e3bdeff5ac8ae45697b432f39756530da2d764516d88f11508bf13956289d5d1aa51204bbb59a42ba7d1459767c4fa0f9cf8138146b8b92669187892d6a8f4dbeed86ae4a1fa9cc88b311301044d35178bf26b795", 0xa6, 0x8}, {&(0x7f00000014c0)="78b54b3ac52cc76a9b2c95f14cc09cfd2b6f8f57e7279e3d72c8f0480e972dc0ad3ac232637d6395f1f1db562e695f106b0c9173809bf36fbcd2e99aa4bdb332ea8b3c2ea379b27f142f6fe6a3d8a5dbc104ada8129c1257e35235d51148a4b3d52c87d8237cd5e2d653a9243d8f5e80f6a32d5d1c783b4ef6b0428cde56a83fa0ba108401b4273abc7742a9aca0e37621e0005fa8f1924117b6739d7cc575aeded48433ac01e512c7c4049add98b584e2eaec97eb32fb0d68745ebe39359f16172e4d7069f5f3a8c164b20459260fc4f0def6e3dbef214ee513840fab2647ba9502d564", 0xe4, 0x2}, {&(0x7f00000015c0)="246ce7433b559adfc02e2957bd292abebe14e4", 0x13, 0x4}], 0x50000, &(0x7f0000001680)={[{@norock='norock'}, {@sbsector={'sbsector', 0x3d, 0x4}}, {@overriderock='overriderockperm'}, {@norock='norock'}, {@cruft='cruft'}, {@dmode={'dmode', 0x3d, 0xffffffff}}, {@nocompress='nocompress'}], [{@euid_gt={'euid>', r2}}, {@hash='hash'}, {@obj_type={'obj_type', 0x3d, '\\:'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) 10:18:25 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x0, 0x2, 0x2}) 10:18:25 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) pselect6(0x40, &(0x7f0000000140)={0x8}, 0x0, 0x0, 0x0, 0x0) 10:18:26 executing program 4: clone(0x0, 0x0, 0x0, 0x0, 0x0) 10:18:26 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000040)={0x1, 0x1, 0x4}) 10:18:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4800000010000507"], 0x48}}, 0x0) [ 338.168518][T11718] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 338.249704][T11718] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 10:18:27 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:27 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x2, [@union={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @const, @fwd, @enum={0x0, 0x8, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x10e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:27 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0xb0a23aadb76a795}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x8}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x23}}]}, 0x38}, 0x1, 0x0, 0x0, 0x2008000}, 0x8000) 10:18:28 executing program 1: creat(0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) mlockall(0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 10:18:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') sync_file_range(r0, 0x0, 0x0, 0x0) 10:18:28 executing program 3: creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0xd, &(0x7f0000000100)=0x0) io_submit(r0, 0x0, 0x0) [ 339.753266][T11742] ptrace attach of "/root/syz-executor.3"[11741] was attempted by "/root/syz-executor.3"[11742] [ 339.925689][T11744] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 339.943231][T11749] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:28 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000440)={0x4b, 0x1, &(0x7f0000000040)="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"}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 340.086814][T11752] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:28 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12c, 0x12c, 0x5, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0xb, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x4}]}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {0x9}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x149}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 10:18:28 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 340.486085][T11769] ptrace attach of "/root/syz-executor.0"[11768] was attempted by "/root/syz-executor.0"[11769] 10:18:28 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:18:28 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000054700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@newtfilter={0x9c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x18, 0x2, [@TCA_BASIC_EMATCHES={0x14, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_META={0xc, 0x1, 0x0, 0x0, {{0x0, 0x5}}}]}]}]}}, @filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x48, 0x2, [@TCA_RSVP_POLICE={0x40, 0x5, [@TCA_POLICE_TBF={0x3c, 0x1, {0x6}}]}, @TCA_RSVP_ACT={0x4}]}}]}, 0x9c}}, 0x0) 10:18:29 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r3, 0x80, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}, 0x9}, @in6={0xa, 0x4e21, 0x5000000, @remote, 0xfffffffb}}}, 0x118) 10:18:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:29 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:29 executing program 1: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x60000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000002000070700fffd946f61050002000000fe0208010001080008000f000400ff7e", 0x24}], 0x1}, 0x0) [ 340.965690][T11787] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 10:18:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb676, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x81, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r2) [ 341.143547][T11795] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 10:18:29 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:29 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/locks\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xa4, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x7a) 10:18:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:30 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:30 executing program 0: [ 341.873026][T11823] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 341.893346][T11825] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:30 executing program 1: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x60000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000002000070700fffd946f61050002000000fe0208010001080008000f000400ff7e", 0x24}], 0x1}, 0x0) 10:18:30 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/locks\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xa4, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x7a) 10:18:30 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:30 executing program 0: 10:18:30 executing program 1: 10:18:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) 10:18:31 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/locks\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xa4, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x7a) 10:18:31 executing program 0: 10:18:31 executing program 1: 10:18:31 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) [ 343.006683][T11853] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="66cf"]) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, 0x0}], 0x1, 0x6b, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, 0x0) 10:18:31 executing program 3: 10:18:31 executing program 0: 10:18:31 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) 10:18:32 executing program 0: 10:18:32 executing program 3: 10:18:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="66cf"]) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, 0x0}], 0x1, 0x6b, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, 0x0) [ 344.202271][T11884] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) 10:18:32 executing program 0: 10:18:33 executing program 1: 10:18:33 executing program 3: [ 344.876649][T11896] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:33 executing program 0: 10:18:33 executing program 3: [ 345.513014][T11908] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:35 executing program 3: 10:18:35 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:35 executing program 1: 10:18:35 executing program 0: 10:18:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:35 executing program 3: 10:18:35 executing program 1: 10:18:35 executing program 0: [ 347.220607][T11924] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:36 executing program 3: [ 347.766399][T11933] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:36 executing program 0: 10:18:38 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:38 executing program 1: 10:18:38 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x27}) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80206433, &(0x7f0000000540)=""/4096) 10:18:38 executing program 0: 10:18:38 executing program 3: 10:18:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:38 executing program 0: 10:18:38 executing program 1: 10:18:38 executing program 3: 10:18:38 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$TIOCCONS(r1, 0x541d) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:38 executing program 0: 10:18:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) 10:18:40 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:40 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000002540)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000002440)=[{&(0x7f00000000c0)="0f", 0x1}, {&(0x7f0000000100)="d104247a2d3b97820a702717b9d0801f0bc6280d182b801e3e3053e1e0a74b4a56c107eb827eae8b13c30a38d42fbb5d6dd62bed0b48879b1c13947d6a6075c5bfb808668a40298aded3478859572cbfc167952e4e6a8324d7baa94606c2dddf817b003eff", 0x65}, {&(0x7f0000000180)="0d331922540c76a410fa09024e0da6c2bd0f8f7f94db17bea9dc8101c6b2752bfe27d313a92caa040bd699fc710a1acf83ece2fce2214ec0956a714ee68004dc0cd38e2bc7479222d186943fc289a9dea70bfc017afee89e6d5cc83c453cabc21fb3", 0x62}, {&(0x7f0000002580)="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", 0x1034}, {&(0x7f0000001200)="c38e390149757bfec28c13cd93eee785b8c54e4bc87b5b53004628316b1bb45bd0918a69395bc19e7f9aa2d39668d944b3b6d53feec602b8a4c461ce0bcc3950f7c587f06730e071f5f304bd4d03714b72138a746059dd319695b309775d4f7f13ed590fdf63f6670560e5a52aeded55f53de20289e3b4ae9790ce6e0d8337e1fa0e7af018a10af6c24309f159a9d7823f1b88b94e43230e0449769200430e51ee89c0fdcc2c0fba75c26c931d8d92d34658c3fb0f84e347a6bfbdf90029cb9706f878829e83199a8856487b2b9638ff3dbfc2cb59aceb46f7b52588d7a7d5ebd2a3430291622d9bc82b31b74aed805b054f7d165ffa88ae9caa2d67bd6506a900d5384b525d24084d49d6953752fa32f56bb222651b4f21bc3ac1d85698ca8c8e46350192ad69afce05973432a88c9e8372be27d794c80e1390fa749f64ae55c06a41d91faf466071abe9a6ba4ada2cbeddcc0cf268f040bca2c0f0c3a125d47e7f314190fe7ea278d04c22f61fa259219b4712096b846eee68751bd3ee04979d6cce123313d991b6424b9ec1d4b1894c63fb1c3f147d40b48c869ac825ded9ac21bbeed363a42831533cc510e60732985e614ec8dddd049b4f602c423bd771bc11fa8db95c0267621ee69d54f6fdbf88cd1ea9204691eb250ef16301bec418c6d02ad8eccaa9da3acc5f670f35899c95d3e695cce4aff596782bda072322ed24fc3e272112ff28b7d11ee5023e64306c79204fb91a37145b88543275eb59564d40f633de369a5d7b8b157e8fcf48cfaa9fcb8c18184d2c9c1af7b530caa82a55442a52254480531b29a28fd3e4a7278c8f1ad3fb9e9c3434f32c3c51f1889ebaf8de15816e66b3cccf6f53dfaa26dd9acccbfabceb517fe9a102b83daa7a72eaac04806dca090308903c0c83ad33b74d73abbcd936cc7d561811566bfb25a84ed454624d20867333b949d49e3a7051ed37961b47b1953abde45db32360661b20f26d40b1bf45e26480f48b192f91ccae9f1483716e0a9af7318df4208cd8f8ce03bd364a2a3c532f2eff4a0cd84004334f89781c10d8ad24b15e60aa1e86772656d0b3c2dc9e24b7030c48689af66946e8f84eac0559a5e875ca1e0fced56a29e4fcbfd3d2b4bf6ba3037fc9aeeb97150f0c4fdfc97d9213a014ed2665ba1a73eda25def46b41557ced242a3b125ae7ad35b8a4daef31dfe489060f4da8ea7fdc5da6d311fa7e97e0a88638f4c237e0a6c1a4331d19023ed8ea8c5ecaa37b523d0ce5da8269b208480d53560c949fee5a8d4dc1536d81d930305dc703202f3228f4ccb6b1f963d2940bfcba04628e3861be046ca3e604315f4a90d75c30feed01e78261ac6540d0a090753d3c5ba88b6680477ac352d334bda9cc8791dc62e397db147974affc1dd43d04fc8d215255bc920fd4bc76bf1dfb5c9c86febb1ed26ef3e5ddcc038090160766f46b2511fd587a49991a0e03a73182f4e84400bb37a4076b2aaae6cbcc4ce131f150c8d5e37478d1d0564bed9cd5c07053e8dc6b2673fe7f91988a4b75f72082323af0250ed5a836e419e3b4a8e83a8d965c59f4aaab8fb7d9c4dd6aaee1c2d939f580bfa211e14938768340271d23dfe4fe9a270bf009ff97acb2e0bae030d38943479e155ef5de676f553383b7c3506ff08f49f420ffbf921968af3463692d9c017598f823d6248690753ca31557c10bd29e4e2db653161b531f12d12854889b79ca0a9bb9c1935126b453dae0dc145fe4e38a434bbe87241b53835c487e61f75add514a2e5398a7e63c855d9ee9a3b4bed7b64f9af2b6d1ed23a9faa298a6702e03d9f24bc0b860f71faf6ee5e1499d0adce721243c85658d68245bb68a3497d150dba528ec4e720b54964ee52c233abed055b61f57ed74842b7ed08cca713de7e92fa01f0b70409f136c868bed2b342aa2628a7be0d454be0c3f24e9acc11735b2fe532a206a782f6f3bf20b93b3d6174c334de1edde7663c279fa6755206ac3b80b880cb4f7fc3f75d41acc2f1339d4f4fedcef74d4c2d2a0bab060dbed8b825b76e729e9a48a714b3883cd79786b44ebf56545caa936810f1d1d4b9b90c5ce1a7ef4ff6a862324654dfbbbb4b3433ef52c47a89f9c15bae8ccabd8442210f474d1d4d0898fea81ad3cc38ca64575278a0f7a3efb0a5a914a1f19598ba3a8173d1017fd9f6f6ab7e1550935436002a12cf0ebe9de3264c637e05fff6b2e85f8a3585da16ba748b860ace2057301d674344463704d65b321f7626a7bea18b05c112612481f3c99fb33397a3d19417ff906bb8ea3f4e94c441fb3729df2d196693c9fcb04c579ee52c1a370b7de850517f0eaa26a854b056eeb2b88e33d9504aefd2fa7c6c3be34c2415f5fcad7b909372ede7f768c4690867afbdb4b4e614e29fa03d4851668eeb6874992eafe7249e576f61276d1b36967ebfa2a56a6b36debf49e07569f032fc9c1363a411b708f5ff5266efeeef232d615103e3c9f3e069add0a7b4d7706fb7aee6c746f38a422a03e6902d4802ba94320e1902cba3246eab07233406371aacfddfd24712a977646655ac66b03bac279dac27d5dbddee9dcbbc8aaad7d2f69291a02d13c13bb037972f6941c388fc2ac4bcce560677a5ca3d58e62c718e54bffa75501441faec7981250b1150ef119bda53ddc02d3997f73c2f9075f5c55d05be37ea963e79fec63405db4079a2b0756871d5a0afc765665f3a6138ea8f74659f53a10a5166853d4f4a34f0fa43832503111dc2a3c1590f266deed8af6ccd5b3e2f187b876728be09c848fb5597b16fae5bc234fbc05b7fce3ca1042e149d2d893ddf5ce0a7ccaba1f427fe5251576e233bbad9f718644376b7d2323f6eb21b8ba3fec5d4fd902fb89b9f9f01239d99c25aecd405cc4267e172592ec791aace48bb4af19a5158732d025c80df9aa02b9ecfb38b001f06580c55a5a20f126ef27c7c68e3200f11ddef8f3614a3992ea41e5b5eb155e34af884b47c72d9c13116fd90f599ba5dc91d6b34fbd5dd16386960ec0ae9ce7c7b604a82a5e408469b90b02ae631f62e64a9c64aed2d591c11c084c437e04826d889fbb9e0f2faed2e367f36912dd0cc2fa9aba672650f46c294dcc5fb60abdc6c4650b06fb6e3c4e337589ab5ef56bac0ea7bde572e2643300f577658f7a8a1cdbb8806789452f47ddd8ae666401c4b12db8e78624a59df6b8ce041cb123530f1bb7e9c71933a369d7b841938675488acd6315eae3af6a87619ca4857b2ace9e030d0f5e3f105900e060e5c889bbc296a9ad7439ac649fe28298eeb60b45cd03017bd0e77c67011963c3e0174c543091505aa724493923240cf447f5f31d60079beae97430d841350dd8ae5a2513c980e4ddf14e1c575945664251793c03ddfcc74258e69010df8c3364832341d9245e1e2b6f7e95620b56d383cd800c10fe5cb2f6651f5c5004faea361b1d7f91bf85e6fb865fba37bf718f2f24e8c98a476976c0191d2e3f36405bc092cd93c5a9856ed6c5bc1bfa5f460be8a365be329eeb2fd1a0c544df38449ef47410c9770a76702c16446f1370369e64f6086160882b27115efb14ddace450adf814b1c79ba6e4006b28c6bd7be5ca08da1dbdb29ae98d2431f375ea6c404b449e2c3de1ad4a7e9f818f13889b7ffbd61d190835c17a939d77848c8dbe72bb1666d48405c297bd20ce40dca17c87fba78f8da6bdea84d8bbc7da58402444dcc724345332e673031594d36453122ad133777baa81d7fffefc03842a9571f639f1f6f082e129552fa77820e489cad236106fcbe343d989eed385b9af8698ea7e9b4a4bc21d120c2babe9c65985e2ef3ccffbf622ddc66f1e22335d8d465ac0e1683e8e746f66d9402a1fd67b0fa2ccd65a91416a8b9d6f9a1701140ca05408511e9716852118d9879470739ad690544cdb37e2254bd483063bca15641df6539e91ce18d57e2372b5d178854c0949c6221d0dae1f7f9e601bef175687030bbf5b53b43913295e99813b19b4d5da2d7d35b2aa2da6c7fe89030f070ad442d06958aa4c812adcf6ef237b139c3a1a747730bf332807e714de4f96f7d784700b44403d3b0602ff48a7f7ee96bb79b2c785e1814caf5f11d0e9701273c3f3cd54029bc70c01276d28819d6335aff8ca77f48f18b7f2465fe42ac0f08ee487f5a32ea62637ac2023e529e495f7def2c2ba95dec6813d692214adf715102aaeaacae0b7eb1a2109ec5eab3d0f705fb4d69bc10332d17a82425c2e1ba900afe75a8bd621597dd32a9ed9ab9af985a68607f7378c1e9e9337737dcbcfeca3ccc39fc17a9a57e8b783e4d1bb8e9c9b745d139f7582c37a97a31ce79a32ceeea6b482499596c4eaa173c9050d46d1ab3340e65907980eb9726ba2148e6b21f05e841e1ebc61a9d37394a14e7ea52943762e44797ece5eb2ade1a2f81df082662879d6fed52538c3f4ff938e08eebacfce850055d55d1a5af8c89dd8c5cc39e20c95e60302ca8fad8a910c6c5f8901a1975c8f3d5fe8a8d00446e8d7bc1f04f7b22db73d331af5fd4c0808e7a15b8f416b96047daed635a3ee6a0aa8bdd5ac60501f1717975d02fae4704fa527c38be8847db0d59c143f56b4a2e1dc5da740939ae526dcc5c2fa33645bab978bd593c9f539b23cb1f681256126f418c87f10a3252d1ee275c2d66a50a0598fa977b9b2fd52a68efe3a864e0b854a43ffedc1fa18cab7e470ddc151ff0709f627c4429569a6674f2ff03806452d1128af2447f5a7d394feaa163f154e93748b9c12eba59b2514626b87a99bf8bf793454ba6f4ebf94149818009c67982c1525adef7907b221b3ad20e222e6e3748df3a9e7f60156c190cfb12911437e1227376a00e5eeb7e6c35348c574bd44528f857f5e901c75da3cf895fa253a0ad13dd80b3722a131cca22e7de24e2df5231ce737384356d5dba148cdec014bb6dda2b2909c7c57ea12d69cf928a9a259f64139253a475fec41c1c3615310308e21db7369c0ece09c656d2b6bde8afc79b44fd6688c647851faecd0e2d83e3d45850c1dfd5e76ef95f7e7b4c14c5403c382c4f776be97d451a82d9746e954a757f7e3f580ff5e11aeff5678f7a3bf3bd431633811c0c4f28cc4223d70797e0b30e3f6ccb398b9ee8bbfcacc8ab8b4c24cc201404b88b6b8793ae68efcc360612fed9134c2e145e39bdb239a2aeb7b341aa503bf587cde1fcc347b5933f5dcc46aac899b4a8b9339423d1a9857cfd283bf2026a5a29bf13462d6057fc4f298e841f5910e2a9892063aba53abb6e4acd32bbdd95bc88dad5b1b18cb7743b6b6431d98b115c5e1f811ebe63176a5d846fa1444b6688eca8e88fdc015e96788c63443565290c226dbdebc6b8f11ac1a33247776f987827ec89f1e43a2903661c", 0xef5}], 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="140000008400000007"], 0x14}, 0x0) 10:18:40 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDMKTONE(r0, 0x4b30, 0x1) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x6e3ba2749964d07, 0x0) lseek(r2, 0xffffffff, 0x0) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80041272, &(0x7f0000000040)) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:40 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 10:18:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000200)={0x2, [0x1, 0x0]}, 0x8) 10:18:40 executing program 1: 10:18:41 executing program 0: 10:18:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000080)=ANY=[], &(0x7f0000000140)=0x94) 10:18:41 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000200)=@newqdisc={0x2c, 0x24, 0xf0b, 0xffffffff, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x0, 0xc}}, [@TCA_INGRESS_BLOCK={0x8}]}, 0x2c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6gre0\x00', r2, 0x2f, 0x9, 0x20, 0x2, 0x40, @ipv4={[], [], @loopback}, @ipv4={[], [], @broadcast}, 0x700, 0x7, 0x9, 0x40}}) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4400db322855ff0c1edbc853012378f293d8033c", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010063616b65000000001400020008000d00000000000800030000000000"], 0x44}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000540)=ANY=[@ANYBLOB="f6a6083a78b3987c7a0014d4907aa91db2800b15d913ee5eadeac9865a43cec255d047ac7280ee70d7a25a6e70e71bff3492cd6a53cb3be9f517e5622bb1240583000bddade54b812ceeee3fbcb5d909f94aba55b6264e0214f028ca520d70f3d3bb37d35b9e4721b127cddeeaa02dbaddf63e04cd5570d12fbbe498", @ANYRES16=0x0, @ANYBLOB="000229bd7000ffdbdf2531000000080001000300000008005200", @ANYRES32=0x0, @ANYBLOB='\b\x00R\x00', @ANYRES32=0x0, @ANYBLOB="0c00990002000000ffffffff6ffd9900810000000100000000005200", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r4, @ANYBLOB="0800db00", @ANYRES32=r1, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB], 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) lseek(r1, 0x0, 0x0) r8 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e22, 0x7fffffff, @dev={0xfe, 0x80, [], 0xf}, 0x3f}}, 0x0, 0x0, 0x15, 0x0, "dd04ccdcf44e5f3df69a586f74f2dbd32a7d8ba01598d005161ee7f62932c497ff5867b5c2916dacedde7e71cc1365b42bd12b043d84eee16dbc2892c1dd5534632947574267a59c2f740cfb26bf31ff"}, 0xd8) lseek(r8, 0x0, 0x0) r9 = ioctl$TIOCGPTPEER(r8, 0x5441, 0x8cb6) ioctl$TIOCL_GETMOUSEREPORTING(r9, 0x541c, &(0x7f0000000000)) 10:18:41 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 10:18:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000}, 0x14) 10:18:43 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000280), 0x8c) 10:18:43 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:43 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x22, &(0x7f0000000040), &(0x7f0000000080)=0xc) 10:18:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/212, 0xd4}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000009c0)=""/194, 0xc2}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x615, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x712, 0x0) flock(r3, 0x40000003) shutdown(r2, 0x0) [ 354.815165][T12050] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 354.816944][T12051] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:43 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) io_setup(0x1, &(0x7f0000000040)=0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r3 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) lseek(r3, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x17, 0xdd6, 0xcf58, 0x3, 0x422, 0xffffffffffffffff, 0x6, [], 0x0, r2, 0x2, 0x2, 0x2}, 0x40) r4 = dup3(r0, 0xffffffffffffffff, 0x0) io_cancel(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x5, r2, &(0x7f0000000080)="cb1a91d8048626aabbcc0cd3bc40455af7e8b22bd7de9432b766dd57cb916fa95801b7e588d003cee474b3ee706341ea41791ae98216c5b912f109bb117b0908e5527c10b2b00aceed4508d384ae2e90c4c5dbc9587db4d3165d8cffa7fd2ba03151941f2a7b5e5e10d3157f9f5805af951eb526383a1bbcd12a8bceaaaae5af62459488fe21ff50c22ef742714634fde0384ca0711fd7c82bb644ec8365fce7776a87e3c6ab46a3c397274c8bef4c1a268d24ef51353932812a5eb42ffa734a2869d221e0f3d6366aa68065", 0xcc, 0x0, 0x0, 0x0, r4}, &(0x7f00000001c0)) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:43 executing program 1: r0 = socket(0x2, 0x5, 0x0) connect(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 10:18:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040), &(0x7f0000000100)=0x8) 10:18:43 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) bind$inet6(r2, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) 10:18:43 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000001480)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000180)=0x9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r1, r0) 10:18:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 356.281108][T12093] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 356.304575][T12094] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:45 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:45 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c65302074756e6c30002074756e6c3000205b2074756e6c30002074756e6c30000a07d6aa913f1a084d08650c3c4d31105753c45c8a48a4964993441d460c69f92356ff239e64608c38b4dff3c5c56d5e5f95c2b01eb84ec8206e341b61e61edfe91754342d3f03638c7a89a56d8f23e78dc065a5ff18b7e50926669769f4227934ad726d19d0948eed9f9f6c747a167082c4f2738c4775b066b4deaa386cc938d10123863917717a3c67edda7cae6d64985db6cf4de5041c86e62256dcf7b24068050f156e7f3ce1acdc3461f15dd412f3418a246d339e0be04d2db154bf84b7db16b632116cda"], 0xe6) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000040)={'ip6_vti0\x00', {0x2, 0x4e1e, @multicast1}}) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x14, r6, 0x7}, 0x14}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r6, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7c04}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x4c}}, 0x80084) open(&(0x7f0000000340)='./file0\x00', 0x100, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="a400539f", @ANYRES16=r7, @ANYBLOB="49fc791ea2797bee2d03000428bd7000fcdbdf25020000001c0009800800020000020000080002003f0000000800010009000000100007800c0000010006000000480007800c0003003b510000000000000c00030008000000000000000800010002150000000c00030e5bb306a890b323a3439f9f4905ce150000000000000000000c00030001000000000000000c0004008000000000000000100007800c000400ff0f0000000000005cd41f9cdfcdb9558d9f8822a00022a3f0a7cf840ca51168767ef19eab07ed183fc435dac72ca5314cc7834c9da200"/231], 0xa4}}, 0x4040) 10:18:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) recvfrom$unix(r1, 0x0, 0x0, 0x40001, 0x0, 0x0) 10:18:45 executing program 1: r0 = msgget(0x1, 0x0) msgsnd(r0, &(0x7f0000000a00)={0x0, "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"}, 0x801, 0x0) 10:18:45 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 10:18:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:45 executing program 1: r0 = socket(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) [ 357.585474][T12119] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 357.604655][T12122] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:46 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/47, 0x2f}, 0x1) 10:18:46 executing program 2: mq_open(&(0x7f0000000040)='[-$^%\x00', 0x1, 0x1a0, &(0x7f0000000080)={0x4, 0x3, 0x7, 0xffff}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x6, 0x3, 0x0, 0xa12d, 0x8, "70ca2fac7a6a017687d044f91cf7235971deda", 0x2, 0x19}) 10:18:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/104, 0x68}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000440)=[{&(0x7f0000000340)=""/212, 0xd4}, {0x0}, {0x0}, {0x0}], 0x4) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) shutdown(r3, 0x0) 10:18:46 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x900, &(0x7f0000000040), &(0x7f0000000140)=0x3) 10:18:46 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 10:18:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:48 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(0xffffffffffffffff, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:48 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) open(0x0, 0x0, 0x0) 10:18:48 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) 10:18:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000200)=[{r0, 0x4}], 0x1, 0xffffffff) 10:18:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)='m', 0x1}], 0x1}, 0x0) 10:18:48 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000340)={0x1c, 0x1c, 0x3}, 0x1c) [ 360.149053][T12180] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 360.174008][T12184] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:48 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$CHAR_RAW_GETSIZE(r1, 0x1260, &(0x7f0000000040)) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-camellia-aesni\x00'}, 0x58) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:48 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x23, &(0x7f0000000140), 0x94) 10:18:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/104, 0x68}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/137, 0x89}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000440)=[{&(0x7f0000000340)=""/212, 0xd4}, {0x0}], 0x2) recvfrom$inet(r6, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r5, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r7, &(0x7f00000001c0)={0x10, 0x2}, 0x10) shutdown(r6, 0x0) shutdown(r4, 0x0) 10:18:48 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(0xffffffffffffffff, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) [ 360.613128][T12200] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 360.634685][T12201] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000200)={0x1, [0x1]}, 0x6) 10:18:49 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) socketpair(0x1, 0x4, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') getsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000040)=""/92, &(0x7f00000000c0)=0x5c) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) 10:18:49 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(0xffffffffffffffff, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:49 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0xa) 10:18:49 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, 0x0}, 0x0) 10:18:49 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:49 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:50 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xa416}, 0x14) 10:18:50 executing program 3: r0 = socket(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) 10:18:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xe, &(0x7f0000000140), &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000001c0)=ANY=[@ANYBLOB="1c1c4e2245ffffff000000000e"], 0x98) 10:18:50 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000040)=0x10000) r2 = gettid() tkill(r2, 0x1004000000016) ioprio_set$pid(0x4, r2, 0x4007) [ 361.932763][T12264] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 361.973725][T12266] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:50 executing program 1: msgsnd(0x0, &(0x7f0000000380), 0x8, 0x0) 10:18:50 executing program 0: r0 = socket(0x1c, 0x5, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1014, &(0x7f0000000040), 0x4) 10:18:50 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 10:18:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x401}, 0x14) 10:18:51 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f0000000000), &(0x7f0000000140)=0x8) 10:18:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:51 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x7e) 10:18:51 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:51 executing program 1: [ 363.239492][T12313] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 363.257431][T12314] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:51 executing program 0: 10:18:51 executing program 3: 10:18:53 executing program 0: 10:18:53 executing program 1: 10:18:53 executing program 3: 10:18:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:53 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000040)) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:53 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:53 executing program 1: 10:18:53 executing program 3: [ 365.474425][T12346] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 365.500344][T12348] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:54 executing program 0: 10:18:54 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) 10:18:54 executing program 3: 10:18:54 executing program 1: 10:18:54 executing program 0: 10:18:54 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x8) 10:18:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:54 executing program 0: 10:18:54 executing program 3: [ 366.734327][T12375] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 366.752030][T12377] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:55 executing program 5: ftruncate(0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:55 executing program 1: 10:18:55 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = msgget$private(0x0, 0x100) msgsnd(r1, &(0x7f0000000040)={0x2, "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"}, 0x1004, 0x800) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:55 executing program 0: 10:18:55 executing program 3: 10:18:55 executing program 1: 10:18:55 executing program 3: 10:18:55 executing program 0: 10:18:55 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = epoll_create(0x0) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/150, 0x96}, {&(0x7f0000000200)=""/26, 0x1a}, {&(0x7f0000000240)=""/72, 0x48}, {&(0x7f00000002c0)=""/243, 0xf3}, {&(0x7f00000003c0)=""/110, 0x6e}, {&(0x7f0000000440)=""/47, 0x2f}], 0x6) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000100)={0x2, {0x6, 0x1a9e, 0x2, 0x4}}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000000c0)={0x7, 0x2, 0x5b}) socketpair(0x2, 0x6, 0x2, &(0x7f00000004c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000540)={@local, 0x7, 0x0, 0x2, 0x2, 0x1a7d, 0x9}, 0x20) accept4$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x800) 10:18:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:18:55 executing program 1: 10:18:56 executing program 3: 10:18:57 executing program 5: ftruncate(0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:18:57 executing program 1: 10:18:57 executing program 3: [ 368.945287][ T31] audit: type=1400 audit(1595326737.349:16): avc: denied { create } for pid=12410 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 368.984706][T12415] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 369.004767][T12416] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000540)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x4, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x290) 10:18:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 369.403898][T12436] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 369.435154][T12437] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:18:57 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x149042, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r0}) 10:18:57 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x800, 0x4, 0x8000, 0x8, 0x80, "a8f002333c57e4d4e110ee27bfc3b4c8bea60c", 0xd129, 0x3}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:18:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a}, 0x1c) 10:18:58 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002700)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000015c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x0) 10:18:58 executing program 2: r0 = openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x2040, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r0, 0x4142, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') getsockopt$inet_buf(r1, 0x0, 0x25, &(0x7f0000000080)=""/71, &(0x7f0000000100)=0x47) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x541c, &(0x7f0000000000)) 10:18:58 executing program 1: 10:18:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 370.942116][T12463] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 370.969655][T12464] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:00 executing program 5: ftruncate(0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:00 executing program 1: 10:19:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r2}, @IFLA_IPTUN_6RD_RELAY_PREFIXLEN={0x6}]}}}]}, 0x40}}, 0x0) 10:19:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x989680}, 0x0, 0x0) [ 372.293422][T12493] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 372.321458][T12494] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:00 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='ip6tnl0\x00'}) connect$inet(0xffffffffffffffff, 0x0, 0x0) 10:19:00 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) dup(0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 10:19:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mlockall(0x3) [ 372.860331][T12508] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 372.878460][T12508] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 372.891283][T12508] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 372.905461][T12508] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 372.920197][T12508] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 372.933121][T12508] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 372.947286][T12508] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready 10:19:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000140)={'nat\x00', 0x2, [{}, {}]}, 0x48) 10:19:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:01 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) dup3(r1, r0, 0x0) [ 373.622199][T12519] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 373.633553][T12521] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:02 executing program 1: clone(0x2000a1047fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="d00800002400ffffff7f0a000410ffffa6fffff7", @ANYRES32, @ANYBLOB="0000000bf1ffffff0000000b0800010063627100a4080200040406"], 0x8d0}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 10:19:04 executing program 5: ftruncate(0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:04 executing program 1: unshare(0x2a000400) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) r1 = dup(r0) readv(r1, 0x0, 0x0) 10:19:04 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000140)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x208}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="4092d90093110d0cddc263e99b7aeb699cdd58d9fd3459c6bae7d929264685cede51fa179011abefec6a8a7d54ab6045fd6ac04d1927e16e3b4357f0690fe62e80eb8b9252ede4f754d91103f772fe169883ecec69be4fe991a170ac53956a165b689d3ec8046b51911b1fb8312fb82a9ea48c8cbb8fd9a6c062bc1df0be4ab5beed82d2640f79e1f62f0c1cdb4de327b746dcde50f444b16c56d86bff09b30e6d982a931050a59e7a06e30447fb9f8455ec4665360055b365841d7db9e07c31c66e12f8d6b3a1f31c2e4808fd30f412203e925a687162cafc406d84617e", @ANYRES16=r3, @ANYBLOB="000129bd7000fddbdf25010000002300070073797374656d5f753a6f626a6563745f723a7661725f72756e5f743a733000000800040000000000"], 0x40}, 0x1, 0x0, 0x0, 0x20004041}, 0x20000001) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r3, 0x1, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_bridge\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x48090}, 0x60) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:19:04 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) dup(0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 10:19:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="2e00000010008108040f9becdb4cb92e0a48b1371400000069bd6efb2503eaff0d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 376.267219][T12550] device batadv0 entered promiscuous mode [ 376.292665][T12551] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 376.306548][T12551] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready 10:19:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 376.315988][T12551] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 376.325175][T12551] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 376.334694][T12551] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 376.344094][T12551] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 376.353498][T12551] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready 10:19:05 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000980)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}], 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$CHAR_RAW_GETSIZE(r2, 0x1260, &(0x7f00000000c0)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0x3a, @empty, 0x3f}, {0xa, 0x4e24, 0x2, @mcast1, 0x8}, 0x7, [0x9, 0x2, 0x1, 0x2, 0x0, 0x800, 0x8, 0x8ab4]}, 0x5c) 10:19:05 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000280)) [ 376.842248][T12569] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 376.897163][T12570] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:05 executing program 0: unshare(0x2a000400) msgget$private(0x0, 0x0) unshare(0x8000400) [ 377.050288][T12574] IPVS: ftp: loaded support on port[0] = 21 10:19:05 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000040)) 10:19:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000880)={&(0x7f00000001c0)={0x1c, r1, 0x27, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) [ 377.807710][T12574] IPVS: ftp: loaded support on port[0] = 21 [ 378.235140][ T1281] tipc: TX() has been purged, node left! 10:19:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getitimer(0x2, &(0x7f0000000000)) 10:19:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) epoll_create1(0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port1\x00', 0xe3, 0x31807}) 10:19:07 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, 0x0, 0x0) 10:19:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff00b23400000000000000000030b6dea64a3cb8439c4faed42bdc7e084b6bd00ecbb18d6a3e6355eb7c5bbd0c6da14eea503b040827b6ce10847943317c25fbf17ca7e13952f2a0281b17418b13365c23bfe8dca8399199391539f58b2cf91c3383f16f69751b48f64fc829014f1f68071966729019568e5528e6922ed5ef0e397ced801d81191bb8cb4dd3a0e15782a5ea", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b00010065727370616e00000c0002800600020030000000"], 0x3c}, 0x1, 0x0, 0x0, 0x48001}, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaa607a5e34794710bdaaaaaa0000e90c300000000000000000000000000200"/47, @ANYRESDEC=r0, @ANYRES32, @ANYBLOB="49de8464c9223fd16c062a52b05fd333338768b2b39e76f6d25dca2fe35f6d051d74e5579adaa24a3bdcdd0fedfc542762eb44e9d2c436b82404bba160a846ae706a7f65ead0d6ebf533ea29f5bb4514533d1d8fcef0751e7e79da7213993b454767873648c4ec01697b9fed2ff950468a99c64767d51727ba05c4286fd913e4b24d42aa66945ca43b71075d76a4b29fd964c9393e2e734be4d869e5a94c352a88516ece74fcfafc7f2ba99b4a31bb5109c8bd9a604eeb0608052824f79b29bc2e152782c1f663948139ac919ae09f40923337250b0a4622425ca35ed9a28ca33d47b330fbc2c55cdf8295"], 0x0) r1 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="2400d36d887e0939070040b3010064edb6820fc720471ebf868ea124feac4f2e3302c34546c91410b123deed91e4b5fd5f46fbaa7b8f800c762aa86ace6ad9c4d3d1b48965338032eaae969d6e2a45345c9e6ee33bb7ceb819716776a5a1b7864ed8321a15824456a9ec84f345434d15d10fa031d8f0aade89cc19788e6638b5ad919599fb3ca98655c819dd1277d428d6e8207853eb70ea23e02c181f03e43892d41fb39337793c86800be7a96af493663597f42be7e7d5ae097a", @ANYRES16=r1, @ANYRESHEX], 0x24}, 0x1, 0x0, 0x0, 0x4801}, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x4) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r1, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @local}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2={0xfc, 0x2, [], 0x1}}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x80) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x541c, &(0x7f0000000000)) 10:19:07 executing program 5: ftruncate(0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) [ 379.028438][T12654] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 379.093733][T12654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12654 comm=syz-executor.2 [ 379.116445][T12656] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 379.162554][T12659] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:07 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000200)=0x1, 0x4) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socket$inet6_sctp(0xa, 0x1, 0x84) r0 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x10}, 0x18) socket$alg(0x26, 0x5, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000001c0)={0x0, 0x0, 0x9, r1, 0x0, &(0x7f0000000280)={0x990afe, 0xffffffff, [], @string=0x0}}) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) 10:19:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_UPDELAY={0x8, 0x5}]}}}]}, 0x3c}}, 0x0) 10:19:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) 10:19:07 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000022000000000000000504000000002e"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x17, 0xdd6, 0xcf58, 0x3, 0x422, 0xffffffffffffffff, 0x6, [], 0x0, r0, 0x2, 0x2, 0x2}, 0x40) r1 = gettid() tkill(r1, 0x1004000000016) fcntl$lock(r0, 0x26, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x2, r1}) socket$inet_sctp(0x2, 0x1, 0x84) r2 = openat$pfkey(0xffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x727041bc38d9c75e, 0x0) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f0000000080)={[0x4, 0x0, 0x4, 0x2, 0x9, 0xff, 0x20, 0x6, 0x0, 0x4, 0x0, 0x9, 0x5ae0, 0x200, 0x1, 0x58, 0x8001, 0x4, 0x1a3, 0x7f, 0x101, 0x8, 0x800, 0x4, 0x4a, 0x9, 0x2, 0x7, 0x0, 0x1, 0x80000001, 0x7, 0x3, 0x7fff, 0x1000, 0x8000, 0x4, 0x0, 0xb74b, 0xffff, 0x2, 0x3, 0x100, 0x1000, 0x662, 0x9, 0x7, 0xfffff801, 0x1, 0x5, 0x4, 0xa4, 0x0, 0x8000, 0x8001, 0x8, 0x0, 0x8, 0x4, 0x1, 0x4, 0xb4, 0x8, 0x8000, 0x9, 0xb78, 0xffffffff, 0x52, 0xffffffff, 0xff, 0x401, 0x8, 0x0, 0x8, 0x0, 0x4, 0x1, 0x2, 0xee6d, 0x1ff, 0x8, 0x1, 0x3, 0x0, 0xfffffffe, 0x100, 0x9, 0x3183, 0x8, 0x3061, 0x1000, 0x4, 0x4, 0x50c, 0x20, 0x8000, 0x3ff, 0x5, 0x4, 0x8, 0x0, 0x8001, 0x1ff, 0x83f, 0x100, 0x59, 0x8, 0x2, 0x400, 0x7fff, 0xffffffff, 0xa2, 0x7, 0xc7c, 0x4, 0x101, 0x2, 0x0, 0x3, 0x3f, 0x2, 0xfffffffd, 0x1ff, 0xc237, 0x6, 0xf29f, 0x0, 0x3, 0x7ff, 0x3, 0x0, 0x200, 0x200, 0xfeca, 0x6, 0xf84, 0x8, 0x200, 0x0, 0x10000, 0x2, 0x4, 0x140f, 0x3f, 0x0, 0x20, 0x4, 0x2, 0xa293, 0x0, 0x2, 0x80000000, 0x2, 0xfffffffd, 0x7, 0x1, 0x8, 0xffffffff, 0xd8, 0x7, 0xfff, 0x81, 0x101, 0x7, 0x7, 0xdf99, 0x8, 0x7, 0x9, 0x3, 0x8, 0xff, 0x7, 0x140000, 0x0, 0x10001, 0x3, 0x8, 0xce, 0x9, 0x9312, 0x10001, 0x9, 0x5, 0x3, 0x8, 0x5, 0x3, 0x2ef1540e, 0x9, 0x9, 0x80, 0x5, 0xffffffff, 0x8, 0x6, 0x0, 0x80, 0xffffffff, 0xeb, 0x2, 0x2, 0x7fffffff, 0x100, 0x5, 0x3ff, 0x7, 0x10000, 0x9, 0x7ff, 0x6, 0xeab, 0x7f, 0x0, 0x2936, 0x640, 0x2, 0xfffffff9, 0x4, 0xfff, 0x0, 0x9, 0x9, 0x8, 0x9, 0x2, 0x3ff, 0x0, 0x2, 0x6, 0xdc, 0x4, 0xedab, 0x6, 0x6, 0xa0b, 0x0, 0x7fff, 0x40, 0x4, 0x1, 0x400, 0xc4de, 0x80000001, 0x2, 0x1, 0x4, 0x5, 0xfffffffa, 0x12, 0x0, 0x3, 0x400, 0xd5, 0x9, 0x4, 0x5, 0x400, 0xff, 0x100, 0x80, 0x0, 0xe7, 0x8, 0x5, 0x4, 0x1ff, 0x7fff, 0x7f, 0x3, 0xc131, 0x1, 0x94, 0x101, 0x6, 0x9, 0x5108, 0x10001, 0x8, 0x66, 0x7fffffff, 0x10000, 0x4, 0x7, 0xff, 0x7ff, 0x8, 0x8, 0x7ff, 0x7fff, 0x3ffc000, 0xd939, 0x31, 0x7fffffff, 0x8, 0xf3b4, 0xfffffffa, 0x400, 0x0, 0x4, 0xb518, 0xfffffffa, 0x4, 0x0, 0x180, 0x202, 0xce3, 0x2fa, 0x7, 0x100, 0x3, 0x690a, 0xcf1d, 0x5, 0x401, 0x7f, 0x2, 0x4, 0x2, 0x132, 0x3, 0xbe, 0x5, 0x8000, 0x4, 0x2, 0xffffffff, 0x7227, 0x1, 0x1, 0x2, 0xed16, 0x8, 0x2, 0x40, 0x8, 0x4, 0xfffeffff, 0x17, 0x80000001, 0x3, 0x5, 0x0, 0x2, 0x2, 0x7ff, 0x80, 0x0, 0x8, 0x99, 0x8, 0x1f, 0x200, 0x7fffffff, 0x9, 0x1ff, 0x7, 0x9, 0x1f, 0xffffff7f, 0x7fffffff, 0x1, 0xaf04, 0xfff, 0x4, 0x4, 0x8, 0x2, 0x6, 0x8, 0x1000, 0x0, 0x3, 0x200, 0x0, 0x5, 0x36e9, 0x5, 0x1000, 0x6, 0x69, 0x1ff, 0x9, 0x0, 0x20, 0x7fff, 0xbc, 0x2, 0x8, 0x8, 0x5, 0x7, 0xba7800, 0x8000, 0x8, 0x8, 0x2, 0x8000, 0x80000001, 0xad40, 0xf2, 0x8, 0x800, 0x1, 0xea7, 0x8001, 0x10001, 0x1, 0xc2a, 0x9, 0x29d, 0x5, 0x2, 0x7, 0x6, 0x100, 0x62, 0x7d, 0x68d, 0x2, 0x9, 0xfffff759, 0xdb, 0x8, 0x0, 0x9, 0x3ff, 0x5, 0x0, 0x3, 0x3, 0x4, 0x0, 0x796, 0x401, 0x7, 0x81, 0x1e000, 0x5, 0x8000, 0x8, 0x1, 0x38000000, 0x7, 0x48a8, 0x8, 0x4, 0x63, 0x2, 0x4, 0x1ff, 0x3, 0x2, 0x200000, 0x5, 0xff, 0xed6f, 0x59, 0x400, 0x5, 0x0, 0x8a, 0x15, 0x7, 0x0, 0x20000, 0xe36c, 0x0, 0x2, 0x2, 0x10000, 0x1, 0x8, 0x200, 0xffffffff, 0x6, 0x48a, 0x1, 0x5, 0x80, 0xffffffff, 0x3ff, 0xffff, 0x4, 0x1, 0x43, 0x5, 0x7ff, 0x8, 0xffff, 0x725, 0x1, 0xa2, 0x7, 0x5, 0x2, 0x7, 0x5, 0x1, 0x1, 0xc81, 0x1, 0x5, 0x4, 0xfffffe00, 0x80, 0x6, 0x7, 0x11, 0x8, 0x5, 0x4, 0x9000, 0x7766, 0x6d34971, 0x9, 0x3, 0xffff, 0x5, 0x2b, 0x5, 0x8, 0x200, 0x6efc, 0x800, 0x6845c87d, 0x0, 0x1f, 0xe9e3, 0x7697, 0x4e, 0x7ff, 0x1, 0x4, 0x3d97, 0x6359, 0x7, 0x0, 0x8a8, 0x1f, 0x4, 0xffffffc0, 0x1000, 0x4, 0x7, 0x3, 0x7, 0x42b96a08, 0x48, 0x101, 0x7, 0xc2b, 0x7fffffff, 0x4, 0x1, 0x0, 0x6, 0x2, 0x3, 0x9, 0xffffffff, 0x8, 0x7ff, 0x0, 0x100, 0x7ff, 0x20, 0x9, 0x0, 0x2, 0x3, 0x7ff, 0x9, 0x7, 0x1, 0x3, 0x100, 0x7, 0x4, 0x4, 0x8000, 0x5, 0x2, 0x800, 0x6, 0x0, 0x7ff, 0x10000, 0x8001, 0x20, 0x1ff, 0x7, 0x200, 0x0, 0x9, 0x80, 0x8, 0x8000, 0xfa2b, 0x1, 0x9, 0x1000, 0x1, 0x3, 0x80000001, 0x3fd9, 0x0, 0x1, 0x3, 0xc9e1, 0x7, 0x9, 0x7, 0x1, 0x5, 0x10001, 0xff, 0x5, 0x600000, 0x6, 0x68b64e77, 0x2, 0x1, 0x6, 0x400, 0x1, 0x2, 0x5, 0xad12, 0xfffffff7, 0x1, 0x4, 0x5bc, 0x4, 0x4, 0x0, 0x4, 0x1, 0x8, 0x4, 0xff, 0x101, 0x9, 0xc6, 0x4b, 0x3000, 0x87d8, 0xff, 0x3fe, 0x1, 0x8, 0x2, 0x101, 0xffffffff, 0x7, 0x4, 0xffffffff, 0x1, 0x4, 0x7fff, 0x5, 0x6, 0x630ce7f6, 0x1, 0x3ff, 0x8000, 0xf65a, 0x2, 0x5, 0x80000001, 0x0, 0x1, 0x5, 0x7, 0x8, 0x7, 0xf12, 0x353e, 0x3, 0xfffffff7, 0x7fff, 0x9, 0x6606be6c, 0x80000000, 0x3, 0x3, 0x2, 0x2, 0x0, 0x4, 0x3, 0x81, 0x80000001, 0x7, 0x0, 0xa24, 0xe2, 0x6, 0x1a, 0x5, 0xacf6, 0x690, 0x1, 0xf5d, 0x3f, 0xce, 0x8, 0x10000, 0x6, 0x7, 0x7fff, 0x0, 0x49aa, 0x3ff, 0x4, 0x15, 0x8001, 0x4, 0x6, 0x6, 0xf1b, 0x4, 0x0, 0x400, 0x8, 0x1, 0x80, 0xf8, 0x3, 0x6, 0x4, 0x6f98, 0x3, 0x4, 0x20000, 0x7, 0x4, 0x3ff, 0xcd, 0x4, 0x5, 0x3, 0x6, 0x3ff, 0xffff, 0x3, 0x4, 0x6, 0x10001, 0x7f, 0x0, 0x8ddf, 0xffffffff, 0x7, 0x9, 0x8, 0x2, 0x10001, 0x7, 0x9, 0x1f, 0x2, 0x4, 0x4, 0x3, 0x4, 0xf928, 0x4, 0x4, 0xd404, 0x20, 0x1, 0x3ff, 0xff, 0x4, 0x1, 0x6, 0x88, 0x0, 0x8, 0x1c, 0x5, 0xffffff7f, 0x5, 0x3, 0x9, 0x2, 0x5, 0x9, 0x1000, 0xf3, 0x36cf, 0x57db, 0x8, 0x9, 0x4, 0x3f, 0x6, 0x8, 0x4, 0x8, 0x40, 0xe8, 0xfffff000, 0x3, 0x8f, 0xfffffffc, 0xb3, 0x101, 0x3c89, 0x9, 0x4, 0x9, 0x0, 0x46b, 0xfffffff9, 0x80000001, 0x5, 0x1c, 0x3ff, 0x2, 0x1c7, 0x7fff, 0x7, 0x2, 0xb46e, 0x4, 0x800, 0x9, 0x6, 0xff, 0xfff, 0x4, 0xc3, 0x24f, 0x3, 0x0, 0x7, 0x0, 0x7, 0x100, 0x1bdc00, 0x7, 0x9, 0x3, 0xff, 0x8001, 0x10000, 0x3ff, 0x70105595, 0x80000001, 0x3, 0x100, 0xffffff88, 0x8, 0x5, 0x1, 0x96, 0x1f, 0xffffffb5, 0x0, 0x5, 0x0, 0x4, 0xc4, 0x48b, 0x400, 0x0, 0x9, 0x1000, 0x6, 0x1, 0x1, 0x0, 0xffff8000, 0x5, 0x6, 0x7, 0x20, 0x9c02, 0x401, 0x72, 0x6, 0x7fff, 0x6, 0x5, 0x5, 0x7, 0x2, 0x3, 0x7, 0x0, 0x47, 0x40, 0x9b2a, 0x1ff, 0x10001, 0x1, 0x0, 0x7, 0x1, 0xfffffff7, 0x1, 0x47, 0x2, 0x100, 0x100, 0x1, 0x8, 0x8, 0x800, 0x2, 0xe2, 0x3f, 0x5, 0xffff, 0x4, 0x5, 0x101, 0x7fff, 0x80000000, 0x76f, 0x2, 0x8, 0x6, 0x9a0a, 0x5, 0x5, 0x6e, 0xffff, 0x5, 0x7, 0xfffffffa, 0x7, 0x6, 0x0, 0xeefa, 0x800001, 0x7ff, 0x9, 0xffff, 0x80000000, 0x3, 0x321, 0x1, 0x0, 0x9, 0x9, 0x80, 0x4, 0x6, 0xafa3, 0x8001, 0x1, 0xfff, 0xdb5, 0xa5fc, 0x101, 0x6ba4154e, 0x9, 0x4, 0x80000001, 0x10000, 0x2, 0x5, 0x7, 0x8, 0x10000, 0xffffffff, 0x20, 0x7, 0x5, 0x99b7, 0x0, 0x0, 0x901, 0x1f, 0x68f, 0x7ff, 0x8, 0x101, 0x1, 0x1c, 0x5c, 0xfff, 0x1ff800, 0x7, 0x5, 0x248, 0x9, 0x3ff, 0x80000001, 0xffff8000, 0x9, 0xfffffbff, 0x3, 0x6, 0x0, 0x3, 0x10001, 0x5, 0x6, 0x6, 0x10001, 0x9, 0x7, 0xfffffff8, 0x3f, 0x0, 0x8, 0x5, 0x10000, 0x0, 0x10000, 0x0, 0x6, 0xea, 0x6d8abc3d, 0x8, 0x9, 0xff, 0x0, 0x2, 0xb1ed]}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x541c, &(0x7f0000000000)) [ 379.584562][ T31] audit: type=1800 audit(1595326747.989:17): pid=12671 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16339 res=0 [ 379.629235][T12672] (unnamed net_device) (uninitialized): Unable to set down delay as MII monitoring is disabled [ 379.646928][T12673] NFS: Device name not specified [ 379.776105][ T31] audit: type=1800 audit(1595326748.179:18): pid=12673 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16339 res=0 [ 379.822415][T12673] NFS: Device name not specified 10:19:08 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000200)=0x1, 0x4) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socket$inet6_sctp(0xa, 0x1, 0x84) r0 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x10}, 0x18) socket$alg(0x26, 0x5, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000001c0)={0x0, 0x0, 0x9, r1, 0x0, &(0x7f0000000280)={0x990afe, 0xffffffff, [], @string=0x0}}) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) 10:19:08 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000200)={@mcast1, 0x0, 0x0, 0x0, 0x8}, 0x0) 10:19:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:08 executing program 3: write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x101182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0x80000001) [ 380.204294][ T31] audit: type=1800 audit(1595326748.609:19): pid=12686 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16332 res=0 [ 380.288563][T12686] NFS: Device name not specified 10:19:08 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000200)=0x1, 0x4) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socket$inet6_sctp(0xa, 0x1, 0x84) r0 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x10}, 0x18) socket$alg(0x26, 0x5, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000001c0)={0x0, 0x0, 0x9, r1, 0x0, &(0x7f0000000280)={0x990afe, 0xffffffff, [], @string=0x0}}) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) [ 380.382574][T12690] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 10:19:08 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 380.475222][T12699] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 380.528330][T12701] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 380.741830][T12690] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 380.779505][ T31] audit: type=1800 audit(1595326749.189:20): pid=12705 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16359 res=0 [ 380.793387][T12690] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 380.870909][ T8631] hid-generic 0000:0000:0000.0001: ignoring exceeding usage max [ 380.945591][T12690] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready 10:19:09 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000200)=0x1, 0x4) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socket$inet6_sctp(0xa, 0x1, 0x84) r0 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x10}, 0x18) socket$alg(0x26, 0x5, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000001c0)={0x0, 0x0, 0x9, r1, 0x0, &(0x7f0000000280)={0x990afe, 0xffffffff, [], @string=0x0}}) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) [ 381.004259][T12690] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 381.029108][ T8631] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on %z5 [ 381.076968][T12690] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 381.136959][T12690] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 381.281836][T12690] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 381.338100][ T31] audit: type=1800 audit(1595326749.739:21): pid=12721 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16353 res=0 [ 381.411616][T12721] NFS: Device name not specified [ 381.414192][T12690] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 381.471405][T12690] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 10:19:10 executing program 5: ftruncate(0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000900)=@mangle={'mangle\x00', 0x44, 0x6, 0x428, 0x2c8, 0x98, 0x2c8, 0x1e0, 0x1e0, 0x390, 0x390, 0x390, 0x390, 0x390, 0x6, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@ipv4={[], [], @remote}}}}, {{@ip={@rand_addr, @multicast2, 0x0, 0x0, 'syzkaller0\x00', 'bond0\x00'}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@inet=@dccp={{0x30, 'dccp\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x488) 10:19:10 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[], 0x1f) 10:19:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 382.075070][T12740] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 382.094839][T12741] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:11 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 10:19:11 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000200)={@mcast1, 0x0, 0x0, 0x0, 0x8}, 0x0) 10:19:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = dup2(r3, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106}}, 0xffffff7a) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa04, {{0x6000000, 0x0, 0x0, @private0={0xfc, 0x0, [0x7]}}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) 10:19:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 382.807696][ T1281] tipc: TX() has been purged, node left! 10:19:11 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) ioctl$SNDRV_PCM_IOCTL_PREPARE(0xffffffffffffffff, 0x4140, 0x0) openat$vimc1(0xffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x1, 0x0, 0xcf50, 0x23, 0x420, 0xffffffffffffffff, 0x7f, [], 0x0, r1, 0x102002, 0x6, 0x3}, 0xfffffd06) r2 = dup3(0xffffffffffffffff, r1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000001640)=[{&(0x7f0000000180)="26e707c7787c04f1d31d5f56075440d91f71b454aa20f77410b7d157cf938ea4f795996480b7c5bd86d14fc2dbc67cf382290f53baced750ec2e27b92bb661410f0597c610f928dbef9b5675e1a395bb91be9764f787d9f0cb5d322accf92ef06add2d5637cee43e04cdd74f296342ae5b53a320cfbe013aea7d6653aaa420aa43a8b3a3ebe3b7c100a112fa376bdc0f2787e5bd0e67b4b0a3a0f78222c400e1ed0dfa0c54819af77bd08073284066d848c69ccbcb69387cd7ef53c28d5594de9aa588cf17ad6d63298c9925d1f7c72ba63e5bcbaa1f28cc7b", 0xd9}, {&(0x7f00000000c0)="4802bfb3c2517aa981843e4263823d9a821a01d3e4ce47f55367a1be085812f0a34ca9a43b330370574fda0720145ad9", 0x30}, {&(0x7f0000000100)="5055a612282f7e18e7690c9f2c27be", 0xf}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="3792bf18f74f79245f7c4e21f0596f47295c49f62db595b55842021af9b76ecd922575aeb1fdde45280095f5ae50a965eadfe64b5b12a1b51d538c528ee2b8eac766b331320d81ed37e245e1f52de1a52b44455b04560a8cbd3cc30b0596241b8fcc9bf64e429b4c", 0x68}, {&(0x7f0000002800)="21bb8ed53a6f131cfeb32edb58e74818860eda8a7d5edbb51185b029453691a55e550300d4c7513eca892a3459f6bb97e040a63c862935291aa2c4244a918a6b04948936e1d4e169e17bb3b50476f365ea5fdb6e7b53126395a0e94d046ae9be6f32d5929dfdbfe592858cddc68a393306b214998cefda30e58869257d8e4c49ae47c62ad33eb3756e71ad9aa01e1e573bcbc6bb67a5beac09098814f7d505163a9986c3f5ac4b82ae726b21ce9c216ee4b68b4ff3e6349de3fc03b2ab60f6a5a9d3b488ba517f91237f737e860709eb0476d3f1075d4f6873036a654e4dc2189d08c905550784fb090aea43029645ef507d8634548283b5fdf1aa9b44a5df11c01a12a79da12293cad070f7e6dd94d5ab79f60ba5a5f83b56fc786607367612b1c1c5000af8c92e0e5c2423f8cfde78c514ef98cb7c8661b63c9af2d0c39a8a134258d35f47093bbf4562c31f84c731a848f4d964b52840de7d797771432c66c669566111c71aa5d31fd6b78b8d35e841c4f84ad7a1faaa0c7f5880d3ec8668fe06ad7e9dadffda8193131aa90000143e9efae0929803cd2198ddf3bbbf4833b9e33848dfdbf130b6c70dc1fba0aad4f77dd1924172e7f43a18912f6606cd9cbddc1581fa1501eb1f0c7017be513e9535edda5f94a88611b616d65e8f30eb4734e5d631853e9665ae1e78b890760dd68d1572323ce7c79df358830ea37fe566e0aaedcd5eb0cb7ae3b28760f486a7fa0b7788e039c317d044c8afb620e7728a83fc235bf5848c4497689d2d835bc2c8a1947aafc871abfb601cdd125ada14bf6ef3f695c30fc1e2650d4626b00d86a590a96773632ce2008902e1af82d52ee8ed371e2f4977d127f30d58d15fba5cb375a0f4d3c0ec7c2b2a84481cee1c32943e45c4cd1228e0c53437b3b2768e8366a9a44233a8d3d6197c46b85dab346b04a9c8d4dcb57301e549d44ee16aaf2432929552b49bf23f87d19f14112be45f1907cc0f6f8f0058797ac7f558ba9f39d34ed275a270d446e6748831eda50a9beddcfb17ae9d471df48264b1767cad882612fba13dd644eba06e37326f8e968c486f13d968df8869750f5e7a52abc4edc91d6cf9e0b4924eae77e66532c0eb2b51cdbfff4331b9543a50b84635be29d3770057ed2ab845ecff4802ceec7b467360d16b9acfb74c6cb5064b60dfa9a0ca643df5284a1746c5bed310a98acc901f46bfa251051585bfadd0fafac78d16aad962e442c3d442b328236c746008d5cc0e753ba1fecb8a1b8b874fa740ebcc95f8a82edd8f49988a9701ce2a8476111896a90177a17ab10e965fdf0ad7e27266134d9da23991deb3e062c34cbf259616eb9be9f6647bb59712a6a856a09e60cca1dd0017e71189ab64f9d348c944400837d9fb50134f70afc87a87a2dbeda51fd98bd6dca946a1143f8d5f576d35c4e0420a4b438019c874a1687cf82e10396a83c541a61adbc67da48ea18ee0587860aba532edf3f6b57e6dbae7fd2484ff80613ea81f93ecb7ca0b512617d666a970075dd78873694faa9a1ec0ba5e62881c0175439dd7b77fea600d895a035f8e07aa0e2bc386fbe2c1a8715a709d11748a2abe48828bc82c56047580b11aafffa02ed5853f384761874b91c199f7bbcb9e6ea3efeb696f77867ca86462011bff8c04ec9ec3a09f0a7bf0a547f5da91fcb6a9401075dbce5db29898418f8cad105b544b6bccebb06305a7edba95ab79824a8b8b8fbcb751f8e1c296eec444bdd1f40be6a2ce290ff14edf9cac85bf57c7a7b1dc1c2ff8e6258a2b0f32e54e1058aac8a15fb3911d47865e14dc41c11d5af773d75cffde73584f45417c8d231370527250d5b1351b3340f76c84f94880924baf7d1bd45ec83d9bf2f5ecd4a32e1fec5c5c5556bdda0aac4c70029c9383eed08302fe155fb755ef18d2512f49f4efd18c154fac7d5f20f4fabf87dc05c84d572416080b77184991388fd78d31883dc558eabd8bb4441d66a6bdbbb66f448277a185c3b0f87d3461cf4d5fad153e2f2b6fd93dbea2b6dc2c8cc708440ba2e564caf914e9dae765c94e004ed2c16bb043764c91168a618e0a839392091ca358eabe388d2fa02e648c2813621a9d814690bfc72c8e88416c8469113e2faf1153c99d39c33217c29a8950adc631fbd0705e50b354bea9aaf5bbea0b1a0ac7c0766cf86543984570d128e921609b66583345935ccec07a940a6bf5ed971c2c84e011307367bcc2bfc6983acab44d3d8988c925aace2e23ce7706167a98c7c1494ef8783339ff9d5eef493aabc770d2586430dace457f2f282bf65794ca7f40825f7396cebb698743ddc5839b4d68347d28f9fc5704fb022c97b64c1f8dfb1130089e04010951786c0e28b8cdd4911c19b589d4790e361a4727cf7f8f08be109d5b30a1b376147622a03d3a16210ba499a99073f5bc9ae4bda80d3ba971ece435f5db01becf1cdfb6b892800344adb81c4486bf4477c67702b5af1deaad59d6681fb433aeb296fe00c7e82cce743f4aaf9e57b53cfc63d1223d8a2e97a2a0c2f886199e61282f8c075d8d542b9aa6b8d81ccab764322f49a9757916a3b60b15e8a2bfd1231985117376cc02e4b2dcdafd79ebf8d24190cbb40da534e64f73a4043139a641d9c7154958a3154860e6d819f3179ad8e6ca1de5e54e5d16ed898d2d4fd80836ce24f287777137d422ee92b0d5d2c36b7ff184bb84d431079496e8c6c8d876172b62c440c88aac38f4302a301d64fb5a58c72c82195a99ba6968150be9388cd28e6eed6f3740a1d0bf52b2ff6ee746f05ff47497179afcc2f226d3f1f1cea77b0134b32d4ee19d1236a27421fb4ec6bf4a8361fc1d5f503cbab4f13a93e50c82f57043ab6384fc7d97c29805938f8e716d554cdb2d53b034137fe230146951ca25d74b36ec8c8b7d6a640b733cfd653078b3911a11e120e634b74910c2db024593d25dad359e8d78be538c5b796286feb1a2c77ef7e0de401361ed2dc71624bb055952663d5e53fb174a43156282ecfaff83720a0442af2f5328a74e86ec7dde712c3bef0dce6fbdb253e2c073e335d7f748b9fcf36d5fcff14f7372c105452a2742b04b54be9ee554d11f7090ed8245464f303b46df044400b57978299598345af5251bcb5306612b3cc07a3cc307d252bd9619658fd56c50ffd4127205b60259e737515c9a354a2a26a4fceaed25ab7704614ae39a012a0e48d27dbf004fd011c2ef6f25d52c24ced6cda7c4675e1ab90fb86b7be214043ba760f33634430586e377ed18686ad140b7198cc0875e0e640a94f4442835fc694e99014f3ebb344d576a49ad92e46594ecd38e97821f7a0b0bd5125d53883ad294bbac10ad103994b0a38f6723af52805d118c847d53211fd77b90f06cf6f69bda43ca2e01e415298b8acf97586d4ad60b00c4193d50af0dbad5b168237226c9c73b858045064e5d09bc30c9f55111abcb4dec5eb9d886bbf3f7bef089a5ee59f9d650aa362f5c0d5b9889df5c28642bd8cf6d8fc46d7eff77da0b6a286af3eab86a105344f9d5f644450e8b9d64f85be2afaae4357135f3dea3bc258ea1c9e013ed6cd46105510d3b442ad48fd3f55a3879f0e2bb5aa8973d4409cabe90968ce3e1b7e0513aed88a77ef0ac1db3d356eea7cfdb7c24a3f9fa7b8e87152a5cf814a90a5a670360421837e3d5e23b6c9edd70955015fd05b8ae5487a9fdce9f1a86276673a40515eb4fb7389759d020fd6a9a4f3b9e1e7e8ee18bd0e31758c2d2628e25f5d64779f86a0d681c7ce9605aa74d7fc794325cc8bba59cb0b83fa201201cc39f1c82e4826a680a4ff59b31795623b5e70743b8f12487b310a736657299f814038375dedf0e5a351c4384bd399d0e38d396302edf7f659dcb8e8c7b8dd22756590da2deab3a66e8d9d9e61d47cd79ddf3881bf11eb041387cea6c5547ce5571b02a609978a329f77bc474f59bff847e5a57a74ca03e778a09d9d4d3abd4b0a3857aefb49dbd590f5dd01fbbd24d5e1e7ae7238caa1fc0e37f818903d22b011ad4917f7e8a304bd728bd5f55839c1194f880137b64a3621b7dd60c49b4715b30959fe50ec7a81e795dd5219c75e72decced2bebe24a3ba321bab5e0cc85d5ed0837ea3a46206cfa4394de9987aebee4ead54e4ac838d5f5290527852aff4a99dbd83c97fb43204522e951ed48fd5aeb445bf978eef577dc55dd8306dc535023362f840d86894b3efd7bffab6c284257d9256a494b55b9e4aa1123920977c673c3ab7ac5ab96a4ffdf539d962878d974193aabcb09980ebcf0b4cffafe48352f922fad779fadbe00b2ecefb182094bab42a89b11b8c6f611a8020b2cdee71502eb58ab3b4a739c757e7313effac7b414067f3f9ee2c78c8c338c7c40a733d5db26274bd1ad1ef2e4b81e379e5e681d6e64f46c7725d2ded7166ca873f687009e5f5fdd120b7a8ce37ab51cc67812d613debf0477c4c0cb1e838ee6cae80579f0d3e08c04765a293664fcf7eb5fb702d394da7229c9fdd9456b963a9e2ac23f549b6b1b427c4bb703534ccbe16302089f9b2bb88812e08baad4ffc34385ab73b22584ad482dda78f141f2ef92dd860843ed28076cfbaf46597063082cc1951aa1b53d9cf9dffc3c4bbc68a7394c7e5fb2fd16c1374155f0600b635dcda82a350375d168f3e1a018b3bc4a77d790507383a0166b3c89d828ff1b364336eb219a9be37a067902ae6a47d5e05ddec6afcaa23c5e6b893330dd693e673adcbd2d4d19b4d0ad2a4299360a29c1ee40bd7ed1a513a7e65dcca1328aa35ee39c1b33cf28610b0df3f1687256835dac0233fedef643d9d4a715f2e33d7108024773c32d0e7b7daa5e539a51b0eb958a93ffbdf7519f561956a67268613e8d9d250e0fd8a01cbcc26accdeab4bd1418b82c7fbeb8eec9ca2c18ca26d6ee0b411573888c501f9998ca502a4c8118837199aa2087a30af51708f92598d9abbf7d3bc28b363008bd7525d8d589999ee4f0c8fcb8079f576f3785532b5f15550d3fdd22887182b9b29aecc7a71ab23595d4096baf305896f7f4a47e9598c7e914f51543af083b9a33413e1c5d517166b1ad1bf6f2d7963b14dc341cecc831459098257568d239e4da724072fd830bcbcdbfd534596915644509ba6b2415636cee9ccec98f2ae73d4b11f760b7aa1e577831075a556ef01d0fc1cc6caf77a1a688e8a7af948f1ca4eef151f2aa26861a094f80d1f27d7338dbb0c9d15e026854d67d621d7c5891d88eb37b665a957207f761beb9d2b6e3da48923e83daba5c1a879c58219d88a3adeb9aeae3c1995e823fd7a997a1eac93c0fe115165cdb34ba06ef1f1902bf95e113b55e6e9bb9fe297a3e323732b86f7db0df12c4b669e052018dd37520ae505609235e490e9b944a21cc560e43116b35743b1c1acf62c80132ca0d6322eb53b0e0cb77812625ace6170e22eda334460d1ba911f910c2e87896337a34479df3ea14e47a34dfb083f8d0032ced5a64020a51eee656d10483c200a99958d8aaa1737bd548d56daf5028136c16d3d1c765e8a3feda95e2469cd1bcab9fb973fe2c28bd7752f65353f5ffab66d412ac3fb3e28aa68485ff80b96c8eb61a52a6c319c042ad54f365bea40572bb893a0a97a9cb57f48f457a833fa7f6302372f6c53df48a27d2550aff2392f548bf970f8cede14a350c4912f5706f02644fe5c972d18116b4c74fbc78e9ee12b02e1af877d98a43a81fc69421cde6034d8f1334bcba3b49d68cdfaf6b27f46bbaba5233d89c1920353c", 0x1000}, {&(0x7f0000001440)="899f8c363fde9a933004cd3f8b4667517b4b72cb752debc6f548c7e8c59d19ffd16c6353d0ad23d43c03824082e682a960cd695f30323ce6f462229a37a593f5059137ae26b45edd1eb5a53db68e718339189709144989304098681f54dd6d3498651d28afc5dc0c62982ae21a37e653ad4d7fd7a192910a3a4105f2933fbf84998598d0db3de5e5238e54cb1882080b4c872b63ea74bcbc275fcafc197908c82b92a240841865f2d4f5dd4f5447f098dab8d9fd8a78e1e6e34cb5579381ccaca6ac7b9df754272b31dbd29c28b670981079be823541633caaad31e086255124ccc06b75cd", 0xe5}, {&(0x7f0000001540)="50673dbe0f7a5b0629c448c20661ca179602cd885a669a0b86af91c4dc58dbd78688b40b19fdc3ce67c87735cde0c864cf3fe6e355e7229c0c813b92e577ec81a808fd2657605618294baa968a02669351ece39505385062fc625b3cd550e18d3dfe8681e346402740275d8ebd69c5ca1292f0c25886f139856be3a46d3735dce02064dfa17a03191b", 0x89}, {&(0x7f0000001600)="1653fa221a7d423bdb2bf9cfcb4481fa0ce82f84f44e257f2673ef437d6a89c4be36a2e8f0757d3b22ea868bcd4d30c5bbc21e5d2fa23412d1872858f03effb8", 0x40}], 0x9) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000003900)=ANY=[@ANYRES32=r6, @ANYBLOB="40007c00673a35e4b270a4d36d787cbf2f2c28f6260b8c2722d18532500d199af571a91c04c9b8f00294feba0ea712c5cfb7981daa6691d8e204bff1a5990460d99bd79a09423ab6890185ad90f1075534e8692ed080c0b54e375ccf3cb5afe854b995bb9d28567db1851ad87d2049090455ed1e450543bf61fabe2ad747b1d27a0cef34ffd088618018422d8f3d6bf7290ce8fe88aa3334b11ceb2104e44f1a979540987525d5a43fe10a6ffcb881c9729ba62fed2f00e935ff7f9f6e700927b492e66ef56ea39caebeb87be1fceea080"], 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000001740)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000010000071ae89d6d6ea080eb341234efac9db8e06cdc57ace0963e569327febe20c96209113aeae55febf89ca854b64e0c1ef83b377e51c60aa2fb359bfbdac095969da6dd4400f78cda847ea22b3e02f7e9283854be0f9f87739e9e9cbeebc0fcd1444d7458fb6e237e73d5d46b90a9c21b854bd58086b685f8bba8539c55fe7aa9636c6c602cf05c22617eb63f9aa95857727712e0de373517677bf38f3d91dba072dcae146d111d2b0033c73120d15968189ce487d072258849b757dacd77525d05bbb2b580543b2f15b9b3afd07c750d1009685d0d631dcb55590e6ea8def27611477ad531fd9c4c4c2ebc659abae7e41e87bb83349aba96cd9883f6dd1c12d11fad5fbd6671c957417323564b60bb002bc110a434218a28bcc4c61060c59b3b4433e18435676a1b2d6133ada3b9bfe7934fcbc0ad499833feeec858c2b4fd53c19ad22971c5b76203f0c2bb825add115ac59da1b8e9c76e97991c899d8e05a3caa5d0fa9f22cc30277a3decc07937d127f180133a79f86ba6acd6273766ad3382f128ee37575df64fd24dd5917dad11a2d3f04629beb730d448695b852882a726eb98ad00ea7fb6bab66519b8af75ce110a3511ca229808d6afc7200d16dd271be19a7e9c05ed952070d7af3488e1b6ac736f547aa4b3242e3d84579ad028aa0663edbb7bfd72928c79664e648d2bdffb742379993d8ffa12fdf623761a89dc67933a267300a15cbf06e60add6e0abe5d1321b1a7c64d6669d74fd091328e9e45ea66a9b404c0b46359bdd7bfdecb93f942ffc67716bfcd856ba42e9d16861a93197e582ca57fe3760efda5140382710acc6b7edb60e31f88c9c13d8a77c0b37865ae3b0f278a4859cbbb51793a1bbe84277238977fc90a96caa23c9ae14299da392c7b089a65e0f84ef18c753385956eca7f8aa441fa493bdbde289637043ab88018014db6993bbf8663a76e7d01baef8b99984c986e1e45576540daa570ba1b9563207feda11beeab0b67c9df226262f1722125220e994d840d2d9dbf32451308d38c44d6d714a2e47d1ef0e3379b211954cbe2b104da1e8008a3d0302d9ebc9988909ab658802dea3f2704cf8292695c2b0aa89888fb0416e1b3823fbb006a1fd8b205e2f553102d87205d164f9e97be47640cd1c0160d61c856a6b244dcdb642821b403530bec41d13ed9850aa4924eacb2f2d73c4d8c09f5cab136e4922e5a79c1e094b83482ac100c9e3587ec748919e25c9940371d2fec1c2714656ff275bba79ff19ae66bca6845f65ad8e5d9a609c9c490ce54cfc0a7c4417297473040e3f1505bb40e39fe97507373485f005631d0eb051520d4dc1ff1257410dc50b07638bb18d89588833435ca1276a8bbaba89daa784957b8c4d232ce6702b5539bdfa98883284e7b8b59aeab4ac0e529135efd4b0c07bb5d1c3ff237839a6e76b9c655a66267bf907399b143560e4ea8e1ab42b322cf2f2ff50a3c3dd1f69e8403cab710863db96bebb6264c63f66773d9645356b91723909475120075b045f27569c3518f745c9f73b02ce3c29240510eedc15f340d65f9e275575963517247dc751fb3a423fb447214d338cbe541b5400c21982dfb221bd28cb14f1cc3cdd6eb22cde71d4da390caf79bfae2b85eb2e23c22be5fcf10521fe9056c8c656bff57fe267f34844463bd65cbd7c3e392039bbfcf52437b3cd7fb3c11d84426b0c4be813108755d7efc802d992b4122a503c2f90db884136f503acfdf170cbc40e1d816a13800594196ba515776540c618fd31673fb82cc542a49a3ffd5bf8589654124aca3e437c741c0b3ae7f493e79ea104202fe1470bd1705c47456c40029d40c122b30644eadda3b5cd40b6034598ff634ffe91f1f7b3d790953d57eb919704765a92a2dddba081da376054810d15f57315c74665982dc9827806d11614ed9d99f7877a7c42b5039097a26ebf5cade62e71db84c9f380236259712e3cc5f519df202048d810b4f92f2d9c78ebb6b7c2e4f3f9fb7235b1559219e4e4fcf83c2db03e026115bbb62235ec28a772107ba9c0ae0fdab72004e698826f2cc6611ec8d6d90541a77fde8f807da476030ab49de90edda48bc6a9ed8ac44ad90b1151abf7a990f436a8f29c880b639ffe295f6fba1db41f66529124e8e92ca0d9b3ca273c476cfaf810652c1aa27632e0e85dfa7220fa1c9051c9351c1d91290159f3a60490d2bc6aa09304b3b8e96dd7cbbc58ca9bc9389bc0772bc6e2b4b0e2597e55fafbd73116d8b069727b49ea663e23cdf44b0a531e93ac6481feaf99fa6879b15ace7cedc25fa0666496ad67b600a20752c52ab46d6f4205a65474c1d7a89ce9929f793f6060b13c86c720b195b3038c5e158cb1bb1219fc4b5035f87c4bde0e5e190cf0413b2cec5860560e0801092b0ac6324238755add77aa825ebf968d42fbbbe9521a6c672634cb0e2d80e1b51e8bef5ce5f3c83d065a946e71b3e07867cac87fb17fc4d359674a73765ef640756e238f8de63cc9f12cded32af6be1ede512110fd64ad8e6880a5656bdafaed8623326ba4adc69019ed3826b89eed33450e82a74ff3801acb0faed2a35452962337df1813f260a34002a528b432e6e93ec3dd1ccfcdb52c1c403e47f477fa56b0bd39b304f6597d4ba86fd64142fd923517be894ecf92afb89e69f24381990a7dd28ab0c3f993d0fcaeaa03ee6a5441642a05cb6f9f4a12f8d2e70b780670a7ff3990316a36143842d1c31e0c422cb879e6f0b8698d5c93f433aba4b60592405224255f72896e05af655f326c22f59fa2239141af85ed78eb741a1842ba6c7dbbb4d640b2469a8fca80a6fa4bf375fb953fab3834f5a8c16d33f70c59286ba25c5ac4c4f2e6311965734c2e6f6e9b24f0b47084a4489c5ffede5586463a7167df8d61fcc81d689326eaefd12cccf8c2c360287312238b55109692ae29c3528b1d53eb2732159d6da5905987ddb5a6fe8dccc7d44fbce5fc2b4b654527de9155a45c78fd83215ed914056cdf21a8422193f72a34ac145c8597ed1ea2b72a9ff7045612db1aa098c8cbd52f92f49d753f0e0ea5461b638c9884b49717daba27ac0c00f33d662f1676d9db8797edd284c5a1fb11c14743e77daabd1bad854a65faacc4f143d6fc3ac015f2e2459f1f7f449a21a01321d129d5694512c7e86dc5fdf1674e46ae1ec8f31f3fe9dbf0ea56560f5b2d15a013f8d71591a0578ffef60159abcb5df4460fa40cbd69ef89a40679017666b5052e131e72c6c95a367178c72eb7e6b3bc1aa379d7a960b346ddc7b4629b76b41634858fc7f2f91d510e82174db3bc0d67db6191b0a40404620a3bb955e5d39ca6f7e8f6d4ef03cfe6d4f51b6cb05b55ba8b86d7290a1f8f3be5fd6fa6c66c756130b0c65aba6bd7b91b96c844c563cee173a47572d014d740a45ee50587fe61cf9abb64d77aa8d3e746339877ee26b8397b07cc9a29dd4c4ac1a46570e91cc20a1b5b32b617237b0fe7283582dbaf15b8a0c032261a945df082dd9b116b4e401268acf25e7ee426c63929fc1724d1640cb5a22683144901313cae2927f633bde5f931c0c6064b61e16091568fa08c984cb44b3aa8d9b0ad99bcb66fe8496435ea50da03d7b8621ff51ce4589e26d6d83e7333c283d1f8367c2c101aeac0f89539aa938eedf1c2a36db25a836839db29fab1c44f0f6dec4410c7091856f9ebf103109dcec5a8b15e2ccdad971419a9c582d8114e69201d733e82f8e6cfdc35009d56eb84b57f9166caad4ddcfd08c23593cac3d7b0498c97a4b2de59286d3976f26dc9b50b057e3d9a932f7b39f0ae31776c0860f5310285888d44c1643ec276751f783218006f052bdb1648c1e8e7a0e469f56f3823f644245109bc2cac0f5c2a1525582044bc4b878f79e2f1234668e1ab3178c88e11d8c33c79380abc6becc7984d26db1b2c24bb58e8ba291b3499ecfb6f0a9b4d9e383366263352a062d4db3332f6f8c48735f8ffb66334da8d3a322510f0f5bafd013f74607f7a3e39f8aa68499d089698e1a3422a02823806a7b4019db2ced7ccb28dc4096adf964e7c3cf388dae0b0c57b4307c962c32256df3812b4aa8c2e973b033346ae0e7bceaef495f68315337b54e4b749279db690f21a40d0c22e1632d7439162b07873bcd96918598bc9aa67dea526c92c0ce57ba15153fe7a591009e048d54d84610c8c55286063dd4ff801e9597da9b072c0947d01fbf6a13d3890aaeb284bbc0e2e5e48d0952f4f2aa3fbb060ba1a4e82907bf1cfce8a9828341cfdf0e6757f69ef8516029c1008f27061f81ff7d4f0273175a567cf65e850b86876e55fbe58a446de3fb5472e2622bfc9ad205c9ba90f01b61a749c6658108d2177b8d59ac8ce831ba0a3de176f6edae1c43b687178a44ba245ad4c8ecdb15197ca1d526b52f9b5f5eca0e5c163b91938ad131f1b980a6b2e9b31882e31b3915d5e38fa77b2ac2758412f12168c62ee4e8d57e88ce4d4e4540d22275879550e69f781f5d134e7964cca9caecfbeb3f0b9a08a9e15caea539cb78b2d6868f9b5ef78a5ae3e2025f8d67fb1ef22c4220b6f36aef56d619e0ad20f2d39afcdfe6d6c406c5264798da7c031d4ed7fab21ce9e5a57390548c4d164f112946ce099b63a9f623f1442bcbb066d5e9883969da672b6911f61ae6f1720fd820afc0539f5f5e98664b8392feaa7eac4e0017ee8bfbe9351fba880418be6c3a8aab766491903edff2919c8561f5de02f9af4879ccdd8a90731b78beb15ebfc4bd456e0fd7fb2a400b4a17b3410376adefa7269e8de765323060c956d2d4fe2e710ef5db058526c1439536e396c3f0acf637f27f63bc6555eee5dab8d39628a6740020b4760f08d02b86806230edcff756cc4600feeef0d39abf7546cee3e00cb3a609d957fa346659308f46139d0d9aa14074919be31327f6f1102427cd80e916699aef3ba46726af4a37cdd6cb9c6a523bdc40179c150f7b579022f1e9adb72a4afaec153a5e1ecb9e97ebc81abcd0a6b20358a0094e0c62b6b2127375d59c05d12dda6a787bb8cdea4c2bafc6d485de6e74cfe3adf4f672f152bf9c367a9e5ba823fb67869a9bc9db8b6af9fd4b758d8fae10945c964a819789b58d1102cafba321cbcb9cac88f7cb1217b712bee985cdc49505e78d29cd5a4c8ada9b59f3944e3c32251545bb2e15fb1dc4b6d05291636111c790672c9afe2636ff087b4a636bb8fb417b37e2bf8b62c2ea8d906687eaf71e528242bf673300d52c554894b033976b1a6b80d5fa5fdf00a62dadfe58d9d1ab7ce2db666812c12608fd40162d846bbda761d6a2df721bd2a9bbe0721a8f3fb9c41479e5bf6d978603179dceefd9c13d26a704346c8e961987be8378a4262629f7bf430800184d4d1593837fb73d41aeb79793a8f054c9119feb60f48e22135e915dd35b0fa4043cd8d0b9a820cb4e5b96a7a4ba2cca8a3d3baf53b966566a30d55d3c1e2c2e57d881391e64cc4b8939844e42ba3bc5c34575f3e6fc53350d0c32f705ce8f12b20399b6eaef99562163f4648fe36550ed4b25494797f3bc3cb82e0e4a6565a62a03cc30e16b0e17c802a2067059ce2773982cdd0b74e9abd585d8dc1bbb0e384a2411aa525dabf5eacf098cd25df97ef641d8a303384be6d225428f9dc136b3a6b1e5944c2efd5eb4e72093b41f0b9ef667f9f99a364e1ff3cf6a1cc7b598aa3aff68c25254824b33b5b8ccf4956c3fdfc873c30ef48b25dac01c178aaee3d1d5650d67bb471ebe0f8e243c25ac388f6e60dd91dacf9a9a0078f0ef10c4876e19014ef3088472a54761eaf8754b0be40d0b55f7bbb71011bced8c16d9668e0451328f7b336bf7bcc40a1fe34e19b526dfa43942c25ab570edd846cb4b8ffccd811f7774beafc3a8db3e51ca6e4cb94e0e260501e96b02e4c80079719fd7934017a7a44ec8aa1430f111140107a67eeaac386c5f4840f1f147ed00a93fa807181b67911285551386104"], &(0x7f0000000080)=0x1024) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 383.026042][T12751] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 383.039002][T12751] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 383.046713][T12751] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 383.054520][T12751] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 383.062520][T12751] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 383.070617][T12751] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 383.078623][T12751] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 383.093952][T12751] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 383.106007][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.109661][T12751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 383.113871][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.123423][T12751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 383.128339][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.143168][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.150781][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.158368][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.165889][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.173472][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.181063][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.188707][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.196230][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.203904][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.211534][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.219127][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.226652][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.234315][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.241977][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.249626][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.257167][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.264813][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.272536][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.280195][ T8631] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 383.389143][T12764] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 383.400896][T12768] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = dup2(r3, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106}}, 0xffffff7a) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa04, {{0x6000000, 0x0, 0x0, @private0={0xfc, 0x0, [0x7]}}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) [ 383.834924][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.842856][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.850582][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.858326][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.865932][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.873647][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.881388][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.889139][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.896735][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.904439][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.913263][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.920962][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.928660][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.936250][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.944026][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.951751][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.959440][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.967823][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.975416][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.983114][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.990805][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 383.998494][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 10:19:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = dup2(r3, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106}}, 0xffffff7a) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa04, {{0x6000000, 0x0, 0x0, @private0={0xfc, 0x0, [0x7]}}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) 10:19:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 384.205961][ T8631] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on %z5 [ 384.523636][ T5] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on %z5 [ 384.701753][T12801] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 384.720254][T12802] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:13 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:13 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) 10:19:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) 10:19:13 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000001c0)={0xf000000, 0x0, 0x0, 0xffffffffffffffff, 0xe7ffffff, 0x0}) 10:19:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff038}, {0x28}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) 10:19:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 385.685456][T12825] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 385.708099][T12829] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:14 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0,']) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./bus/file0\x00', 0x0) 10:19:14 executing program 3: setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000), 0x4) r0 = gettid() r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x3f}, 0x16, 0x0) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000340)=@v2, 0x14, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000280)=0x6d9c) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000600)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000005540)=@newtaction={0x2608, 0x30, 0x8, 0x70bd2d, 0x25dfdbfd}, 0x2608}, 0x1, 0x0, 0x0, 0x8994}, 0x810) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x4, 0x0, 0x4, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x401}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000640)=""/245, &(0x7f00000005c0)=0xf5) exit_group(0xa) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xff, 0x0) keyctl$chown(0xe, 0x0, 0x0, 0x0) 10:19:14 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x3) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x17, 0xdd6, 0xcf58, 0x3, 0x422, 0xffffffffffffffff, 0x6, [], 0x0, r2, 0x2, 0x2, 0x2}, 0x40) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000040)={0x5, 0x9, 0x3, 0xffff, 0x8, [{0xfffffffffffffeff, 0x7f, 0x4}, {0x8, 0x1ff0000000000000, 0xdc1a, [], 0x80}, {0x80000000, 0x7fffffff, 0x7f, [], 0x102}, {0x2, 0x8, 0x3, [], 0xa02}, {0x0, 0x4, 0x20, [], 0x80}, {0xfffffffffffff296, 0x2, 0x9, [], 0x2}, {0x101, 0x8, 0x64, [], 0x502}, {0x7, 0xffffffffffffff0f, 0x4, [], 0x2506}]}) [ 386.506408][T12833] overlayfs: filesystem on './bus' not supported as upperdir 10:19:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:15 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffff00fffff674049167a686dd60a4f00800302900033c0000000000000000000000000000ff0200000000000000000000000000010200907800000000600004e600000000fe800000000000000000000000000000ffff0a010100"/102], 0x0) [ 386.547134][T12843] ptrace attach of "/root/syz-executor.3"[12840] was attempted by "/root/syz-executor.3"[12843] 10:19:15 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 386.995064][T12852] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 387.013538][T12853] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:16 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:16 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) r0 = memfd_create(&(0x7f0000000100)='\xbb\x02\xb1\x91^\x00\x00\x01\x00\x00\x00\x00\x00\x00\xfa\xe3\xa0\xd42\x90YJ\x89]\xad\x01\xc3\\:;\x99\xbck\xf9=\xfa\xe8HB\xf7\x92\x16\xbc\x11\xc4\xff\xa1\xea\xf9l', 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="c5", 0x1}], 0x1, 0x840ee6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807684, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x26003e, 0x0) 10:19:16 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') ioctl$FS_IOC_GETFLAGS(r1, 0x80046601, &(0x7f0000000040)) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:19:16 executing program 3: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400007e280000005e00ff03c81f8374b4c125a4ffba16a0aa1c0009b3ebea966cf0554edc7de8ddeb133c2b", 0x4c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0xffffa888, 0x0, 0x0, 0x0, 0x1400}}], 0x300, 0x42, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$nvram(0xffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x0, 0x0) 10:19:16 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) rmdir(&(0x7f0000000580)='./bus/file0\x00') mkdir(&(0x7f0000000440)='./bus/file0\x00', 0x0) 10:19:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 388.365211][T12869] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 388.445773][T12874] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 388.458049][T12877] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:17 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) 10:19:17 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) rmdir(&(0x7f0000000580)='./bus/file0\x00') mkdir(&(0x7f0000000440)='./bus/file0\x00', 0x0) [ 389.041885][T12878] EXT4-fs (sda1): re-mounted. Opts: (null) [ 389.088870][T12894] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 389.109702][T12895] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 389.333030][T12900] EXT4-fs (sda1): re-mounted. Opts: (null) 10:19:17 executing program 3: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400007e280000005e00ff03c81f8374b4c125a4ffba16a0aa1c0009b3ebea966cf0554edc7de8ddeb133c2b", 0x4c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0xffffa888, 0x0, 0x0, 0x0, 0x1400}}], 0x300, 0x42, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$nvram(0xffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x0, 0x0) 10:19:17 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f0000000080)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x144) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x17, 0xdd6, 0xcf58, 0x3, 0x422, 0xffffffffffffffff, 0x6, [], 0x0, r2, 0x2, 0x2, 0x2}, 0x40) ioctl$FS_IOC_GETFLAGS(r2, 0x80046601, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000180)={r4, 0x8, 0x8d6, 0x6, 0x3, 0x1, 0x4d, 0x5, {r7, @in={{0x2, 0x4e21, @multicast1}}, 0x9, 0x401, 0x0, 0x4, 0xfffffff9}}, &(0x7f0000000240)=0xb0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000100)=""/53) 10:19:18 executing program 1: [ 389.872543][T12903] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 10:19:19 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:19 executing program 1: 10:19:19 executing program 0: 10:19:19 executing program 3: 10:19:19 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) 10:19:19 executing program 3: 10:19:20 executing program 0: [ 391.612932][T12935] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 391.632458][T12937] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:20 executing program 1: 10:19:20 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r2, 0x541c, &(0x7f00000000c0)={0x6, 0x4}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000040)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x64) 10:19:20 executing program 0: 10:19:20 executing program 3: 10:19:21 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:21 executing program 1: 10:19:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:21 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000280)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000600)={0x0, 0x29, 0x1531b3ee, 0x7, [], [], [], 0x9, 0xfff, 0x4, 0x100, "fa914858c5e2db27df178461b5a457be"}) lseek(r1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f}}, 0x20) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2000000007060108000000000000000005000030001283ef0c00000000000000ee0acabca9ff346b5b11e585d36334a7f83c22fe9fbd1670e83172f3b08dfceb2bf2f9275254c0ff08f88a2012ea1f8dc41b2a8ecc5562157b0752f7"], 0x20}, 0x1, 0x0, 0x0, 0x44001}, 0x40800) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060400, 0xfffffffffffffffb}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f0000000080), r4}}, 0x18) 10:19:21 executing program 0: 10:19:21 executing program 3: 10:19:22 executing program 3: [ 393.777130][T12978] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 393.792673][T12979] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:22 executing program 1: 10:19:22 executing program 0: 10:19:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:22 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, 0x1, 0x2, 0x100, 0x0, 0x0, {0xecbccfaffef8b25f, 0x0, 0x9}, [@CTA_EXPECT_FLAGS={0x8}, @CTA_EXPECT_MASTER={0x38, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, [], 0x1}}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x8800) 10:19:22 executing program 0: [ 394.394649][T12995] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 394.411134][T12997] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:23 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:23 executing program 1: 10:19:23 executing program 3: 10:19:23 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:19:23 executing program 0: 10:19:23 executing program 0: 10:19:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:23 executing program 3: 10:19:23 executing program 1: 10:19:23 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, &(0x7f0000000040)=""/197) 10:19:24 executing program 0: [ 395.746125][T13028] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 395.781121][T13030] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:24 executing program 3: 10:19:25 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:25 executing program 1: 10:19:25 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c08000003000000010000000000000e02000000000000000000000000000005040000000026"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x1}, 0x40) pipe(&(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x17, 0xdd6, 0xcf5c, 0x3, 0x622, r1, 0x6, [], 0x0, r0, 0x2, 0x2, 0x2}, 0x40) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000040)) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) setns(r2, 0x20000) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) r3 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) 10:19:25 executing program 0: 10:19:25 executing program 3: 10:19:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:25 executing program 1: 10:19:25 executing program 3: 10:19:25 executing program 0: [ 397.396398][T13055] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 397.427859][T13057] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:26 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000080)={0xfc, 0x6, 0x84, 0x11, 0x14, "0c54c24ed6db874f"}) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000040)={0x0, 0x979, 0x19, 0x23, 0xe2}) 10:19:26 executing program 3: [ 397.939374][T13070] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 397.954096][T13071] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:27 executing program 5: ftruncate(0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:27 executing program 1: 10:19:27 executing program 0: 10:19:27 executing program 3: 10:19:27 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) lseek(r0, 0x0, 0x4) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) r3 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0xc}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_skbprio={{0xc, 0x1, 'skbprio\x00'}, {0x8, 0x2, 0x2}}]}, 0x38}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80040}, 0x1) lseek(r3, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f00000001c0)={0x2, 0x5, 0x4, 0x8, '\x00', 0x7}) lseek(r2, 0x0, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 10:19:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:27 executing program 3: 10:19:27 executing program 1: 10:19:28 executing program 0: [ 399.545949][T13100] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 399.565013][T13101] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:28 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x2, 0x0) lseek(r1, 0x0, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000080)={0x3df, 0x1ff, 0x401, 0x6, 0x8001, 0x2}) 10:19:28 executing program 0: 10:19:28 executing program 3: 10:19:29 executing program 5: ftruncate(0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:29 executing program 1: 10:19:29 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = openat$cgroup_freezer_state(r1, &(0x7f0000000040)='freezer.state\x00', 0x2, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r2, 0x8008f513, &(0x7f0000000080)) 10:19:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:29 executing program 0: 10:19:29 executing program 3: 10:19:29 executing program 1: 10:19:30 executing program 3: 10:19:30 executing program 0: [ 401.644781][T13140] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 401.654506][T13142] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:30 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000003a00), 0x9, &(0x7f0000002540)=[{0x7a, 0x118, 0x7, "e98ae7710c1d2ada2fb290cb4a207a0ee69754d36b55a28f1db2d6c94632207c081170923948a7c4af3d6e7088f854f5e0180cb2b1906b5ad12541d4e6e4837fd7bafa12fcfcb28e234a72bfb1155f79dcd141657315c44c1785da88c1f6cc1d4dfac0945941957f5afd17ae0a56706d3c990750bf8ba0a537c6c23640747ef1a2f704ca44e326454bd89eeffea549f995bc87e01fc42c81962c94ccb1b9c0a5aece3a5a1e70e84d7a22fb096aadc4dde1f0999d0efff977817a6114133dbb9246c9eedaeb0f73"}, {0xd4, 0x10c, 0x6d76, "e9ff4e10977f4393186fc98ffa3ebd9b8ddf3aa64c13c8f32d9d7d35307e133122431976ff4e644812ac7fd5ac6a306bcb2c49d53c1284ce57aba93e268ea430b7be3e33c7064ee28c789c9bd09b3fc7712a83791c3ca321d13bbbff19bf34de1bb5b4fde8d987efb9c6097a97e7123094df0a13175ed20ac4824542316a73a0dca3a554c4ea6cf85f4756559709e4aeed6aa64ee1bc58305bcf5e90b955b9bce569a7a420e1a847e96859d377b1f715f3c749e0f4ecf377a7e6531d05efb5f7feb47e9dfe961f"}, {0xcc, 0x111, 0x8, "f91c707046d9b818972e0267e61cbaabb9ee6c5db02dfabc25755586c0292a7d2af9b37d20efffda417099d9690b09915205e71ec5c441bd8b03279f4c752a18714131d162f85c93e6b17ea1971c0a966f2e28c1fc5ae4d439c5ba11d2fb3a00ee19607e465edd41ae33fdc35930bfd4ae9154a84b193332eb4f1c0b5e6d9d46190e7cdb88297d25fb40df258ea2dc5d53a1e7d0a9988de254eaea943272364b9423d20cc46bf1b16084524aa1f4530e051f1f3b7123f62e8b6ccf2aa37690ca"}, {0x70, 0x6, 0xeb6, "753a517d865825ab038b50d7d86f004b8e0163a918e413916aa09bde4871df2a6287814e996f22c9d3d8fa27be0e17520eb1a98dd8c90fbd4735e497116a9d0ece141a0c11a24bf807d08435e528d3fb405d502a14ec84d780b4ca2362bf76b36163"}], 0x2e4}, 0x80) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x3) setresuid(0x0, r2, 0x0) r3 = gettid() tkill(r3, 0x1004000000016) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, &(0x7f0000000140)={0xf65a, 0x92, {r3}, {0xee01}, 0x6, 0x4}) r5 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x3) setresuid(0x0, r6, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setregid(0x0, r8) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setregid(0x0, r10) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000180)={{}, {0x1, 0x2}, [{}, {0x2, 0x1}, {0x2, 0x6}, {0x2, 0x4}, {0x2, 0x2}, {0x2, 0x2, r2}, {0x2, 0x3, r4}, {0x2, 0x7, r6}], {0x4, 0x6}, [{0x8, 0x3, r8}, {0x8, 0x2, r10}], {0x10, 0x2}, {0x20, 0x1}}, 0x74, 0x1) 10:19:30 executing program 1: [ 402.272897][T13154] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 402.286934][T13157] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:31 executing program 5: ftruncate(0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:31 executing program 3: 10:19:31 executing program 0: 10:19:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000632977fbac14140fe934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 403.559553][T13174] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 403.613166][T13180] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:32 executing program 3: msgsnd(0x0, 0x0, 0x8, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/6) 10:19:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x9f9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) 10:19:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @local, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x7, @multicast1}, @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa, 0xb, 0x2, 0x0, 0x300}}}}}}, 0x0) 10:19:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r1 = socket$packet(0x11, 0x0, 0x300) socket(0x11, 0x0, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) [ 404.576798][T13200] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 404.603782][T13201] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:33 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') fcntl$getflags(r1, 0x40a) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) 10:19:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 405.637314][T13221] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 405.648157][T13225] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:34 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:34 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(r0, 0x2201, &(0x7f0000000000)) 10:19:34 executing program 1: perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000240)={r3, 0x1, 0x6, @remote}, 0x10) 10:19:34 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:19:34 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f0000000100), 0x8080ffffff7e) [ 406.431537][T13236] device lo entered promiscuous mode [ 406.518275][T13232] device lo left promiscuous mode 10:19:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 406.540204][ T31] audit: type=1804 audit(1595326774.949:22): pid=13241 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir881936027/syzkaller.BvGBZj/126/bus" dev="sda1" ino=16376 res=1 10:19:35 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0xa, 0x801, 0x84) listen(r1, 0x83) poll(&(0x7f0000000080)=[{r1}, {r0}], 0x2, 0x0) [ 406.678546][T13244] device lo entered promiscuous mode 10:19:35 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x1062c1, 0x0) lseek(r1, 0x0, 0x0) syz_open_pts(r1, 0x6100) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000080)={0x7, {0x32a, 0x3ff, 0x10000, 0x4, 0x9, 0x3}}) socketpair(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) openat$dlm_control(0xffffff9c, &(0x7f0000001380)='/dev/dlm-control\x00', 0x288100, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') preadv(r2, &(0x7f0000001340)=[{0x0}, {&(0x7f00000000c0)=""/79, 0x4f}, {&(0x7f0000000140)=""/252, 0xfc}, {&(0x7f0000000240)=""/64, 0x40}, {&(0x7f0000000280)=""/43, 0x2b}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/77, 0x4d}], 0x7, 0x1) [ 406.753160][T13232] device lo left promiscuous mode 10:19:35 executing program 1: r0 = open(&(0x7f0000000040)='./file1\x00', 0x143042, 0x0) fchown(r0, 0x0, 0x0) [ 407.175092][T13257] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 407.216593][ T31] audit: type=1804 audit(1595326775.620:23): pid=13238 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir881936027/syzkaller.BvGBZj/126/bus" dev="sda1" ino=16376 res=1 [ 407.246011][T13262] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:35 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$TIOCL_SELLOADLUT(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x5, 0x5, 0x68, 0xe0d4, 0x6b3caab0}) 10:19:35 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0xa, 0x801, 0x84) listen(r1, 0x83) poll(&(0x7f0000000080)=[{r1}, {r0}], 0x2, 0x0) [ 407.429692][ T31] audit: type=1804 audit(1595326775.680:24): pid=13264 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir881936027/syzkaller.BvGBZj/126/bus" dev="sda1" ino=16376 res=1 [ 407.454675][ T31] audit: type=1804 audit(1595326775.730:25): pid=13241 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir881936027/syzkaller.BvGBZj/126/bus" dev="sda1" ino=16376 res=1 10:19:35 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f0000000100), 0x8080ffffff7e) [ 408.056560][ T31] audit: type=1804 audit(1595326776.460:26): pid=13278 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir881936027/syzkaller.BvGBZj/127/bus" dev="sda1" ino=16383 res=1 10:19:37 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:37 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000001080), &(0x7f0000048000), 0x0) exit(0x0) 10:19:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0xa, 0x801, 0x84) listen(r1, 0x83) poll(&(0x7f0000000080)=[{r1}, {r0}], 0x2, 0x0) 10:19:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:37 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = semget$private(0x0, 0x2000000010a, 0x0) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000000)=""/103) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000100)=""/82) openat$proc_mixer(0xffffff9c, &(0x7f0000000080)='/proc/asound/card0/oss_mixer\x00', 0x200040, 0x0) syslog(0x2, &(0x7f0000000180)=""/118, 0x76) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000000c0)) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) [ 408.975015][T13298] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 408.986026][T13300] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:37 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f0000000100), 0x8080ffffff7e) 10:19:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0xa, 0x801, 0x84) listen(r1, 0x83) poll(&(0x7f0000000080)=[{r1}, {r0}], 0x2, 0x0) 10:19:37 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) fstatfs(r1, &(0x7f00000000c0)=""/30) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)) 10:19:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0xa, 0x801, 0x84) poll(&(0x7f0000000080)=[{r1}, {r0}], 0x2, 0x0) [ 409.500472][ T31] audit: type=1804 audit(1595326777.900:27): pid=13313 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir881936027/syzkaller.BvGBZj/128/bus" dev="sda1" ino=16373 res=1 10:19:38 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 10:19:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0xa, 0x801, 0x84) poll(&(0x7f0000000080)=[{r1}, {r0}], 0x2, 0x0) 10:19:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r1, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:38 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:38 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xfff80001, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) mkdir(&(0x7f0000000100)='./bus\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) rename(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)='./file1\x00') 10:19:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0xa, 0x801, 0x84) poll(&(0x7f0000000080)=[{r1}, {r0}], 0x2, 0x0) 10:19:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x80800) fallocate(0xffffffffffffffff, 0x10, 0x8003, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x6e) write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b) fdatasync(r0) 10:19:38 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f0000000100), 0x8080ffffff7e) [ 410.531471][T13333] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 410.542404][T13334] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 411.032665][ T31] audit: type=1804 audit(1595326779.430:28): pid=13351 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir881936027/syzkaller.BvGBZj/129/bus" dev="sda1" ino=16360 res=1 10:19:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) writev(r0, &(0x7f0000000880)=[{&(0x7f0000000400)}, {&(0x7f00000004c0)="5123e23521c9ab52235c8147a52b3ee974dbed124b6583e27ec6fe6b1c19665ca8f5ac34d79fdbf196bca8847c063395385db7bfb0a3a9aa7eb63b4138d0f29aa673de3190be80019a5b33f0961aac7e", 0x50}, {0x0}, {0x0}, {0x0}], 0x5) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) 10:19:39 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) listen(0xffffffffffffffff, 0x83) poll(&(0x7f0000000080)=[{}, {r0}], 0x2, 0x0) 10:19:39 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) 10:19:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r1, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:40 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) listen(0xffffffffffffffff, 0x83) poll(&(0x7f0000000080)=[{}, {r0}], 0x2, 0x0) 10:19:40 executing program 2: request_key(0x0, 0x0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x88102, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="0000010000000000000060a5c268002811"], 0xfca) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) [ 412.131839][T13372] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 412.143610][T13373] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r1, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:40 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:40 executing program 3: capget(0x0, &(0x7f0000000200)) 10:19:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) writev(r0, &(0x7f0000000880)=[{&(0x7f0000000400)}, {&(0x7f00000004c0)="5123e23521c9ab52235c8147a52b3ee974dbed124b6583e27ec6fe6b1c19665ca8f5ac34d79fdbf196bca8847c063395385db7bfb0a3a9aa7eb63b4138d0f29aa673de3190be80019a5b33f0961aac7e", 0x50}, {0x0}, {0x0}, {0x0}], 0x5) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) 10:19:41 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) listen(0xffffffffffffffff, 0x83) poll(&(0x7f0000000080)=[{}, {r0}], 0x2, 0x0) [ 412.803962][T13389] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 412.821385][T13391] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:41 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x54, r1, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}}, {0x14, 0x2, @in={0x2, 0x0, @broadcast}}}}]}]}, 0x54}}, 0x0) 10:19:41 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) listen(r1, 0x83) poll(&(0x7f0000000080)=[{r1}, {r0}], 0x2, 0x0) 10:19:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r0, 0x0) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 413.827080][T13410] tipc: Started in network mode [ 413.832268][T13410] tipc: Own node identity ac141426, cluster identity 4711 [ 413.840905][T13410] vxcan0: MTU too low for tipc bearer [ 413.846527][T13410] tipc: Enabling of bearer rejected, failed to enable media [ 413.975636][T13418] vxcan0: MTU too low for tipc bearer [ 413.981722][T13418] tipc: Enabling of bearer rejected, failed to enable media [ 414.125306][T13420] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 414.136680][T13421] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:42 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x54, r1, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}}, {0x14, 0x2, @in={0x2, 0x0, @broadcast}}}}]}]}, 0x54}}, 0x0) 10:19:42 executing program 2: socket(0x15, 0x5, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) pipe(&(0x7f00000001c0)) pipe(&(0x7f0000000100)) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x75747}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x3c}}, 0x0) 10:19:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r0, 0x0) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) writev(r0, &(0x7f0000000880)=[{&(0x7f0000000400)}, {&(0x7f00000004c0)="5123e23521c9ab52235c8147a52b3ee974dbed124b6583e27ec6fe6b1c19665ca8f5ac34d79fdbf196bca8847c063395385db7bfb0a3a9aa7eb63b4138d0f29aa673de3190be80019a5b33f0961aac7e", 0x50}, {0x0}, {0x0}, {0x0}], 0x5) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) 10:19:42 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x83) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) [ 414.614349][T13433] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 414.643069][T13429] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 414.694849][T13431] vxcan0: MTU too low for tipc bearer [ 414.700433][T13431] tipc: Enabling of bearer rejected, failed to enable media [ 414.916469][T13438] device team_slave_0 entered promiscuous mode [ 414.922857][T13438] device team_slave_1 entered promiscuous mode [ 414.929444][T13438] device macvtap1 entered promiscuous mode [ 414.935302][T13438] device team0 entered promiscuous mode [ 414.945728][T13438] 8021q: adding VLAN 0 to HW filter on device macvtap1 10:19:43 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r0, 0x0) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:43 executing program 0: r0 = socket$inet(0xa, 0x0, 0x84) listen(r0, 0x83) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) 10:19:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 415.390221][T13445] device macvtap2 entered promiscuous mode [ 415.399851][T13445] 8021q: adding VLAN 0 to HW filter on device macvtap2 10:19:43 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) writev(r0, &(0x7f0000000880)=[{&(0x7f0000000400)}, {&(0x7f00000004c0)="5123e23521c9ab52235c8147a52b3ee974dbed124b6583e27ec6fe6b1c19665ca8f5ac34d79fdbf196bca8847c063395385db7bfb0a3a9aa7eb63b4138d0f29aa673de3190be80019a5b33f0961aac7e", 0x50}, {0x0}, {0x0}, {0x0}], 0x5) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) 10:19:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000600)=""/80, 0x50}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x100, 0x0, 0x0) [ 416.001474][T13470] __nla_validate_parse: 2 callbacks suppressed [ 416.001601][T13470] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 416.043685][T13473] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:44 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:45 executing program 1: pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x1, "ace48cc5ae1b3b83789444a98b1b923d8e2ce7c506f93483ecee61c78e49f64a"}) write$P9_RRENAMEAT(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)=0x8) r2 = getpid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="7f454c464009617f07000000000000000200030006000000ed01000000000000400000000000000044000000000000000000000004003800010000081f00090000000060080000000600000000000000010000000d0000000300000000000000080000000000000005000000000000000200000000000000060000000600000003000000000000000900000000000000ff0f0000000000000500000000000000b62e000000000000f8ffffffffffffff58f047242f30daa80d3f33053f7fc4ee7224cf567d5f2234f984fe24b9b1b4df18e65cd0cbf9593992d27d3bf3bad0ffdba7586a"], 0x5ac) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={0x0, 0xcf, 0xa6}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha224-avx2\x00'}}, &(0x7f00000003c0)="e5f965ee10ba483d48d8bb4e5967a2b0a287eb5063237cd458d2a6bc71b4297dafc1623eded22f6f580f4b57f0f56af0b000f835e40bb03f8420d031c6cae1fb1d9be41505dc9d9bc5361e120ac711f2251b5b4c4a40fe4575f39834e9dadae59398808b2c0df4102504268cd5934a2af573999ba8c6334bbe1cd95eca002632b00232e7cc264f729c8f1ca70e73024b82336fc892a3b30ddfb053aa671657a938e2bee3f2ad36472e326cdd79b059ac5aee2ff1cee842f5598ebf7b8ba386743fdfd12f6e2bb3efa87321c0d829ac", &(0x7f0000000240)=""/166) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) 10:19:45 executing program 0: r0 = socket$inet(0xa, 0x0, 0x84) listen(r0, 0x83) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) 10:19:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)=0x5cb8) [ 417.279694][T13485] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 417.306038][T13486] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:45 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 417.815713][T13502] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 417.833493][T13503] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:47 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:47 executing program 0: r0 = socket$inet(0xa, 0x0, 0x84) listen(r0, 0x83) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) 10:19:47 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='smaps\x00') lseek(r0, 0xf989, 0x0) 10:19:47 executing program 2: 10:19:47 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:47 executing program 1: pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x1, "ace48cc5ae1b3b83789444a98b1b923d8e2ce7c506f93483ecee61c78e49f64a"}) write$P9_RRENAMEAT(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)=0x8) r2 = getpid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="7f454c464009617f07000000000000000200030006000000ed01000000000000400000000000000044000000000000000000000004003800010000081f00090000000060080000000600000000000000010000000d0000000300000000000000080000000000000005000000000000000200000000000000060000000600000003000000000000000900000000000000ff0f0000000000000500000000000000b62e000000000000f8ffffffffffffff58f047242f30daa80d3f33053f7fc4ee7224cf567d5f2234f984fe24b9b1b4df18e65cd0cbf9593992d27d3bf3bad0ffdba7586a"], 0x5ac) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={0x0, 0xcf, 0xa6}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha224-avx2\x00'}}, &(0x7f00000003c0)="e5f965ee10ba483d48d8bb4e5967a2b0a287eb5063237cd458d2a6bc71b4297dafc1623eded22f6f580f4b57f0f56af0b000f835e40bb03f8420d031c6cae1fb1d9be41505dc9d9bc5361e120ac711f2251b5b4c4a40fe4575f39834e9dadae59398808b2c0df4102504268cd5934a2af573999ba8c6334bbe1cd95eca002632b00232e7cc264f729c8f1ca70e73024b82336fc892a3b30ddfb053aa671657a938e2bee3f2ad36472e326cdd79b059ac5aee2ff1cee842f5598ebf7b8ba386743fdfd12f6e2bb3efa87321c0d829ac", &(0x7f0000000240)=""/166) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) 10:19:47 executing program 2: pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x1, "ace48cc5ae1b3b83789444a98b1b923d8e2ce7c506f93483ecee61c78e49f64a"}) write$P9_RRENAMEAT(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)=0x8) r2 = getpid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="7f454c464009617f07000000000000000200030006000000ed01000000000000400000000000000044000000000000000000000004003800010000081f00090000000060080000000600000000000000010000000d0000000300000000000000080000000000000005000000000000000200000000000000060000000600000003000000000000000900000000000000ff0f0000000000000500000000000000b62e000000000000f8ffffffffffffff58f047242f30daa80d3f33053f7fc4ee7224cf567d5f2234f984fe24b9b1b4df18e65cd0cbf9593992d27d3bf3bad0ffdba7586a"], 0x5ac) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={0x0, 0xcf, 0xa6}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha224-avx2\x00'}}, &(0x7f00000003c0)="e5f965ee10ba483d48d8bb4e5967a2b0a287eb5063237cd458d2a6bc71b4297dafc1623eded22f6f580f4b57f0f56af0b000f835e40bb03f8420d031c6cae1fb1d9be41505dc9d9bc5361e120ac711f2251b5b4c4a40fe4575f39834e9dadae59398808b2c0df4102504268cd5934a2af573999ba8c6334bbe1cd95eca002632b00232e7cc264f729c8f1ca70e73024b82336fc892a3b30ddfb053aa671657a938e2bee3f2ad36472e326cdd79b059ac5aee2ff1cee842f5598ebf7b8ba386743fdfd12f6e2bb3efa87321c0d829ac", &(0x7f0000000240)=""/166) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) [ 419.236363][T13519] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 419.257203][T13523] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:47 executing program 3: pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x1, "ace48cc5ae1b3b83789444a98b1b923d8e2ce7c506f93483ecee61c78e49f64a"}) write$P9_RRENAMEAT(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)=0x8) r2 = getpid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="7f454c464009617f07000000000000000200030006000000ed01000000000000400000000000000044000000000000000000000004003800010000081f00090000000060080000000600000000000000010000000d0000000300000000000000080000000000000005000000000000000200000000000000060000000600000003000000000000000900000000000000ff0f0000000000000500000000000000b62e000000000000f8ffffffffffffff58f047242f30daa80d3f33053f7fc4ee7224cf567d5f2234f984fe24b9b1b4df18e65cd0cbf9593992d27d3bf3bad0ffdba7586a"], 0x5ac) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={0x0, 0xcf, 0xa6}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha224-avx2\x00'}}, &(0x7f00000003c0)="e5f965ee10ba483d48d8bb4e5967a2b0a287eb5063237cd458d2a6bc71b4297dafc1623eded22f6f580f4b57f0f56af0b000f835e40bb03f8420d031c6cae1fb1d9be41505dc9d9bc5361e120ac711f2251b5b4c4a40fe4575f39834e9dadae59398808b2c0df4102504268cd5934a2af573999ba8c6334bbe1cd95eca002632b00232e7cc264f729c8f1ca70e73024b82336fc892a3b30ddfb053aa671657a938e2bee3f2ad36472e326cdd79b059ac5aee2ff1cee842f5598ebf7b8ba386743fdfd12f6e2bb3efa87321c0d829ac", &(0x7f0000000240)=""/166) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) 10:19:48 executing program 0: r0 = socket$inet(0xa, 0x801, 0x0) listen(r0, 0x83) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) 10:19:48 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 420.988443][T13546] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 420.999597][T13546] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:49 executing program 0: r0 = socket$inet(0xa, 0x801, 0x0) listen(r0, 0x83) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) 10:19:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 421.695257][T13557] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 421.717123][T13558] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:50 executing program 3: pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x1, "ace48cc5ae1b3b83789444a98b1b923d8e2ce7c506f93483ecee61c78e49f64a"}) write$P9_RRENAMEAT(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)=0x8) r2 = getpid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="7f454c464009617f07000000000000000200030006000000ed01000000000000400000000000000044000000000000000000000004003800010000081f00090000000060080000000600000000000000010000000d0000000300000000000000080000000000000005000000000000000200000000000000060000000600000003000000000000000900000000000000ff0f0000000000000500000000000000b62e000000000000f8ffffffffffffff58f047242f30daa80d3f33053f7fc4ee7224cf567d5f2234f984fe24b9b1b4df18e65cd0cbf9593992d27d3bf3bad0ffdba7586a"], 0x5ac) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={0x0, 0xcf, 0xa6}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha224-avx2\x00'}}, &(0x7f00000003c0)="e5f965ee10ba483d48d8bb4e5967a2b0a287eb5063237cd458d2a6bc71b4297dafc1623eded22f6f580f4b57f0f56af0b000f835e40bb03f8420d031c6cae1fb1d9be41505dc9d9bc5361e120ac711f2251b5b4c4a40fe4575f39834e9dadae59398808b2c0df4102504268cd5934a2af573999ba8c6334bbe1cd95eca002632b00232e7cc264f729c8f1ca70e73024b82336fc892a3b30ddfb053aa671657a938e2bee3f2ad36472e326cdd79b059ac5aee2ff1cee842f5598ebf7b8ba386743fdfd12f6e2bb3efa87321c0d829ac", &(0x7f0000000240)=""/166) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) 10:19:50 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:50 executing program 0: r0 = socket$inet(0xa, 0x801, 0x0) listen(r0, 0x83) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) 10:19:50 executing program 2: pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x1, "ace48cc5ae1b3b83789444a98b1b923d8e2ce7c506f93483ecee61c78e49f64a"}) write$P9_RRENAMEAT(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)=0x8) r2 = getpid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="7f454c464009617f07000000000000000200030006000000ed01000000000000400000000000000044000000000000000000000004003800010000081f00090000000060080000000600000000000000010000000d0000000300000000000000080000000000000005000000000000000200000000000000060000000600000003000000000000000900000000000000ff0f0000000000000500000000000000b62e000000000000f8ffffffffffffff58f047242f30daa80d3f33053f7fc4ee7224cf567d5f2234f984fe24b9b1b4df18e65cd0cbf9593992d27d3bf3bad0ffdba7586a"], 0x5ac) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={0x0, 0xcf, 0xa6}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha224-avx2\x00'}}, &(0x7f00000003c0)="e5f965ee10ba483d48d8bb4e5967a2b0a287eb5063237cd458d2a6bc71b4297dafc1623eded22f6f580f4b57f0f56af0b000f835e40bb03f8420d031c6cae1fb1d9be41505dc9d9bc5361e120ac711f2251b5b4c4a40fe4575f39834e9dadae59398808b2c0df4102504268cd5934a2af573999ba8c6334bbe1cd95eca002632b00232e7cc264f729c8f1ca70e73024b82336fc892a3b30ddfb053aa671657a938e2bee3f2ad36472e326cdd79b059ac5aee2ff1cee842f5598ebf7b8ba386743fdfd12f6e2bb3efa87321c0d829ac", &(0x7f0000000240)=""/166) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) 10:19:50 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(0xffffffffffffffff, 0x83) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) 10:19:52 executing program 1: 10:19:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:52 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(0xffffffffffffffff, 0x83) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) 10:19:52 executing program 3: pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x1, "ace48cc5ae1b3b83789444a98b1b923d8e2ce7c506f93483ecee61c78e49f64a"}) write$P9_RRENAMEAT(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)=0x8) r2 = getpid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="7f454c464009617f07000000000000000200030006000000ed01000000000000400000000000000044000000000000000000000004003800010000081f00090000000060080000000600000000000000010000000d0000000300000000000000080000000000000005000000000000000200000000000000060000000600000003000000000000000900000000000000ff0f0000000000000500000000000000b62e000000000000f8ffffffffffffff58f047242f30daa80d3f33053f7fc4ee7224cf567d5f2234f984fe24b9b1b4df18e65cd0cbf9593992d27d3bf3bad0ffdba7586a"], 0x5ac) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={0x0, 0xcf, 0xa6}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha224-avx2\x00'}}, &(0x7f00000003c0)="e5f965ee10ba483d48d8bb4e5967a2b0a287eb5063237cd458d2a6bc71b4297dafc1623eded22f6f580f4b57f0f56af0b000f835e40bb03f8420d031c6cae1fb1d9be41505dc9d9bc5361e120ac711f2251b5b4c4a40fe4575f39834e9dadae59398808b2c0df4102504268cd5934a2af573999ba8c6334bbe1cd95eca002632b00232e7cc264f729c8f1ca70e73024b82336fc892a3b30ddfb053aa671657a938e2bee3f2ad36472e326cdd79b059ac5aee2ff1cee842f5598ebf7b8ba386743fdfd12f6e2bb3efa87321c0d829ac", &(0x7f0000000240)=""/166) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) 10:19:52 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) [ 424.124624][T13596] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:52 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(0xffffffffffffffff, 0x83) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) [ 424.235158][T13600] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:52 executing program 1: 10:19:52 executing program 2: pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x1, "ace48cc5ae1b3b83789444a98b1b923d8e2ce7c506f93483ecee61c78e49f64a"}) write$P9_RRENAMEAT(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)=0x8) r2 = getpid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="7f454c464009617f07000000000000000200030006000000ed01000000000000400000000000000044000000000000000000000004003800010000081f00090000000060080000000600000000000000010000000d0000000300000000000000080000000000000005000000000000000200000000000000060000000600000003000000000000000900000000000000ff0f0000000000000500000000000000b62e000000000000f8ffffffffffffff58f047242f30daa80d3f33053f7fc4ee7224cf567d5f2234f984fe24b9b1b4df18e65cd0cbf9593992d27d3bf3bad0ffdba7586a"], 0x5ac) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={0x0, 0xcf, 0xa6}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha224-avx2\x00'}}, &(0x7f00000003c0)="e5f965ee10ba483d48d8bb4e5967a2b0a287eb5063237cd458d2a6bc71b4297dafc1623eded22f6f580f4b57f0f56af0b000f835e40bb03f8420d031c6cae1fb1d9be41505dc9d9bc5361e120ac711f2251b5b4c4a40fe4575f39834e9dadae59398808b2c0df4102504268cd5934a2af573999ba8c6334bbe1cd95eca002632b00232e7cc264f729c8f1ca70e73024b82336fc892a3b30ddfb053aa671657a938e2bee3f2ad36472e326cdd79b059ac5aee2ff1cee842f5598ebf7b8ba386743fdfd12f6e2bb3efa87321c0d829ac", &(0x7f0000000240)=""/166) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) 10:19:53 executing program 1: [ 424.778003][T13614] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:53 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x0) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) [ 425.215701][T13614] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:53 executing program 3: 10:19:53 executing program 1: 10:19:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:54 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x0) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) [ 426.113699][T13634] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:54 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) creat(0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000080), 0x4) ioctl$CAPI_GET_ERRCODE(0xffffffffffffffff, 0x80024321, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f00000001c0)={0x9, 0x1, [0x1f, 0x0, 0x3, 0x1], 0x5}) 10:19:54 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) [ 426.420741][T13636] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 426.471627][T13641] Unknown ioctl 21557 10:19:54 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x0) poll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0) 10:19:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000000340)="048df625b943d473cd9d10dee85ed052f268688ccad0bebed68451f5b4bef3fe8291be3b40c0df5422ce73f5bba26336dc78f2237c62e6e94938a98fc6432eef0d03241011bb19b8d5a8a7b8bb3b46aebb2aca2ec98db7243d949034b6d28d1cde03f76cb6c91e68128031077de3d91ad28c3682307799df6e1958d965bfa58ad7dd21", 0x83}, {&(0x7f0000000000)="282d0271c2b62518fe766509ae8882fcf41bc07d7a7c3d53d08eb9e6af2f8999d67d367c5f838a0272c3f5bd50", 0x2d}, {&(0x7f0000000400)="f01165f1408c5eb68fdf7687786d79fe9d12f4bcc2436a7f0df5cfa4743e28f0a14410a64fd4125e0da320e410a9d1cd38b4e47a2f1bf427e8b0894c634cbebda81332491fce245fd0cc75ac1d3b407f3e7333226b11575ffd94787974fbc35529b760e7d341cbe547edd94bf2f01711644b87b3aa19d7df9281896b9d366e1fdbb90911aee9c218ef5141d519703115e8e280ca0a89a5c6b0f598360ce1003f81562e10a62b9926d46adf8175bb695b0032c1a47865db3aa3ef7915ca6b6c9453820a57698e2a4ac5ac2fc1113d852b6935c55826bf32f718bf", 0xda}, {&(0x7f0000000040)="91168410e080b38d42497ae2187531bfab41346711265e6de37a542b", 0x1c}, {&(0x7f0000000500)="a0e508f035a9fe2b8bb60ccfdb02c7103727a8202444ee14522739d01c682a4e32022df828d18c1e60d89f1f66e689ed2c3e495a344aeabd31f6cfa341e280cc012df21d0d3cf34d8e2e88d2cf7b586cee007d047e371bacde30", 0x5a}], 0x5, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x68, {}, 0x0, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 10:19:55 executing program 2: pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x1, "ace48cc5ae1b3b83789444a98b1b923d8e2ce7c506f93483ecee61c78e49f64a"}) write$P9_RRENAMEAT(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)=0x8) r2 = getpid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="7f454c464009617f07000000000000000200030006000000ed01000000000000400000000000000044000000000000000000000004003800010000081f00090000000060080000000600000000000000010000000d0000000300000000000000080000000000000005000000000000000200000000000000060000000600000003000000000000000900000000000000ff0f0000000000000500000000000000b62e000000000000f8ffffffffffffff58f047242f30daa80d3f33053f7fc4ee7224cf567d5f2234f984fe24b9b1b4df18e65cd0cbf9593992d27d3bf3bad0ffdba7586a"], 0x5ac) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={0x0, 0xcf, 0xa6}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha224-avx2\x00'}}, &(0x7f00000003c0)="e5f965ee10ba483d48d8bb4e5967a2b0a287eb5063237cd458d2a6bc71b4297dafc1623eded22f6f580f4b57f0f56af0b000f835e40bb03f8420d031c6cae1fb1d9be41505dc9d9bc5361e120ac711f2251b5b4c4a40fe4575f39834e9dadae59398808b2c0df4102504268cd5934a2af573999ba8c6334bbe1cd95eca002632b00232e7cc264f729c8f1ca70e73024b82336fc892a3b30ddfb053aa671657a938e2bee3f2ad36472e326cdd79b059ac5aee2ff1cee842f5598ebf7b8ba386743fdfd12f6e2bb3efa87321c0d829ac", &(0x7f0000000240)=""/166) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) 10:19:55 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x83) poll(0x0, 0x0, 0x0) 10:19:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) 10:19:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 427.694088][T13664] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 427.739675][T13670] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:56 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x83) poll(0x0, 0x0, 0x0) 10:19:56 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x83) poll(0x0, 0x0, 0x0) [ 428.605007][T13678] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0xfffffc8d, 0x0}}], 0x1, 0x40, 0x0) [ 428.651731][T13684] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:57 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @multicast, @void, {@ipv4={0x8864, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 10:19:57 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x83) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) 10:19:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44182) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000680)=[{&(0x7f0000000340)="048df625b943d473cd9d10dee85ed052f268688ccad0bebed68451f5b4bef3fe8291be3b40c0df5422ce73f5bba26336dc78f2237c62e6e94938a98fc6432eef0d03241011bb19b8d5a8a7b8bb3b46aebb2aca2ec98db7243d949034b6d28d1cde03f76cb6c91e68128031077de3d91ad28c3682307799df6e1958d965bfa58ad7dd21", 0x83}, {&(0x7f0000000000)="282d0271c2b62518fe766509ae8882fcf41bc07d7a7c3d53d08eb9e6af2f8999d67d367c5f838a0272c3f5bd50", 0x2d}, {&(0x7f0000000400)="f01165f1408c5eb68fdf7687786d79fe9d12f4bcc2436a7f0df5cfa4743e28f0a14410a64fd4125e0da320e410a9d1cd38b4e47a2f1bf427e8b0894c634cbebda81332491fce245fd0cc75ac1d3b407f3e7333226b11575ffd94787974fbc35529b760e7d341cbe547edd94bf2f01711644b87b3aa19d7df9281896b9d366e1fdbb90911aee9c218ef5141d519703115e8e280ca0a89a5c6b0f598360ce1003f81562e10a62b9926d46adf8175bb695b0032c1a47865db3aa3ef7915ca6b6c9453820a57698e2a4ac5ac2fc1113d852b6935c55826bf32f718bf", 0xda}, {&(0x7f0000000040)="91168410e080b38d42497ae2187531bfab41346711265e6de37a542b", 0x1c}, {&(0x7f00000001c0)}, {&(0x7f0000000500)="a0e508f035a9fe2b8bb60ccfdb02c7103727a8202444ee14522739d01c682a4e32022df828d18c1e60d89f1f66e689ed2c3e495a344aeabd31f6cfa341e280cc012df21d0d3cf34d8e2e88d2cf7b586cee007d047e371bacde", 0x59}], 0x6, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x68, {}, 0x0, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 10:19:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x980, 0x0) 10:19:57 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:19:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:58 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x83) poll(&(0x7f0000000080), 0x0, 0x0) [ 429.690955][T13710] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 429.712327][T13711] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:19:58 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x83) poll(&(0x7f0000000080), 0x0, 0x0) 10:19:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) dup3(r0, r1, 0x0) 10:19:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f0000000100)={0x0, 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 10:19:58 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x0, 0x0) 10:19:58 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x83) poll(&(0x7f0000000080), 0x0, 0x0) 10:19:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:19:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETZCNT(0x0, 0x0, 0x10, 0x0) 10:19:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="6653070000053c27bc3374003639405ca8aed1736b533f1500ae47a825d86800278d", 0x22}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x3) 10:19:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x48, 0x0, 0x0, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) [ 431.137583][T13751] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 431.149141][T13752] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:00 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:00 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x83) poll(&(0x7f0000000080)=[{}], 0x1, 0x0) 10:20:00 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000980)=[{&(0x7f00000004c0)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b07", 0x93}, {&(0x7f0000000580)="3db6189eda170a92fab0b0952f922b1e28a06dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e9999ae73519927dc3561acea6da3282a29b70e916f97a8794", 0x89}, {&(0x7f0000000000)="d1225fd04697b63909de5e8949ac6559e8e574fb0abc", 0x16}, {&(0x7f0000000640)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d238771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7ea9be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21", 0x79}, {&(0x7f0000000700)}], 0x5, 0x0) dup(0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0xfdfdffff, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 10:20:00 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') 10:20:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xff64, 0x0}, 0xffffffffffffff36) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x4, 0xd}, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1, 0x4, 0x4, 0x0, r1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 432.319451][T13773] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 432.325726][T13774] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:00 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x83) poll(&(0x7f0000000080)=[{}], 0x1, 0x0) 10:20:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x1, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x5f, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f00000000c0), 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x25) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x3, 0x101002) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200187ec, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRES64, @ANYRESHEX, @ANYRESOCT], 0x1000001bd) 10:20:01 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="b7", 0x1}], 0x1, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) 10:20:01 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0x83) poll(&(0x7f0000000080)=[{}], 0x1, 0x0) 10:20:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x25) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200187ec, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRESOCT, @ANYRES32, @ANYBLOB="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", @ANYBLOB="103fe8e166099685633d0c744bfa86b974ad74f63374875875ee260acc9d92ddd07395feca20bedf15c15389a2", @ANYRESHEX, @ANYRES64, @ANYRESHEX, @ANYRESOCT], 0x1000001bd) 10:20:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 434.353545][T13820] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 434.375016][T13820] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:03 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @rand_addr, 0x3ff}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='bbr\x00', 0x4) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 10:20:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f00000004c0)="1994330c", 0x4}], 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 10:20:03 executing program 1: ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000100)={0x0, 0x3}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd0f969341", 0x6}], 0x1000000000000006, 0x0) 10:20:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:03 executing program 1: process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000002400)=[{&(0x7f00000023c0)=""/47, 0x2f}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x1c1, 0x0) 10:20:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xff64, 0x0}, 0xffffffffffffff36) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd, 0x1}, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1, 0x4, 0x4, 0x0, r1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 10:20:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f00000004c0)="1994330c", 0x4}], 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 10:20:04 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000980)=[{&(0x7f00000004c0)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d01", 0x8a}, {&(0x7f0000000580)="3db6189eda170a92fab0b0952f922b1e28a06dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e9999ae73519927dc3561acea6da3282a29b70e916f97a87944e", 0x8a}, {&(0x7f0000000000)="d1225fd04697b63909de5e", 0xb}, {&(0x7f0000000640)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d238771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7ea9be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21", 0x79}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d61157b0843", 0x54}], 0x5, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290579d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) [ 435.925564][T13868] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 435.964866][T13870] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:04 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000240)) writev(r0, &(0x7f0000000880)=[{&(0x7f00000004c0)}, {&(0x7f0000000900)="98cd50fb74520cb09aa7ceb56e077bf544331d836904bbbfe241e85b83f0231da7e9bef2b26ee47c2d1c58406e806f73354ce80ee7770492f670edf4f8fec5933a5354909f54bdf775f1fa0f5370375b06f424d69a08696d5f193689c1a04802ce227a20e094e462ae173f98528702fbf2d28e3ad58d1a2b4a5dc5f3", 0x7c}, {&(0x7f0000000600)}, {&(0x7f00000006c0)}, {&(0x7f0000000740)}, {0x0}], 0x6) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000000)='./bus\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) 10:20:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @rand_addr, 0x3ff}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f0000000000)) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRES16, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x4000080}, 0x94) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='bbr\x00', 0x4) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$int_out(r2, 0x5460, &(0x7f00000001c0)) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000380)={0xd, 0xbc, {0x52, 0x1, 0x9, {0x9, 0x8}, {0x4, 0x48e7}, @const={0x8, {0x8001, 0x7, 0x2}}}, {0x55, 0x0, 0x0, {}, {0x0, 0x8}, @const={0x0, {0x0, 0x200}}}}) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 10:20:05 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @rand_addr, 0x3ff}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f0000000000)) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYRESOCT=r1, @ANYRES16, @ANYBLOB="02002abd7000ffdbdf2508000000240003800800020051000000080002000300000008000300fcffffff08000300010100004c0004800900010073797a31000000003cf8078008000300060000000800030009000000080001000f0000000800040003000000080002006e740000080002000000080008000300ff0100009800018038000400200001000a004e200000000000000000000000000000000000000001f60000001400020002004e24ac1e0101000000000000000008000300060000000e0001006574683a7665746831000000180001006574683a76657468315f766972745f77696669002c00028008000300ff0100000800020000100000080002000104000008000200000000000800040000000080"], 0x11c}, 0x1, 0x0, 0x0, 0x4000080}, 0x94) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='bbr\x00', 0x4) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$int_out(r2, 0x5460, &(0x7f00000001c0)) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 10:20:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:05 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {}, 0x0, {}, 0xfdfdffff, 0x2, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 10:20:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast2, @in=@local}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}]}, 0xa0}}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0xf, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@local, @in=@multicast1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}]}, 0xa0}}, 0x0) [ 437.740022][T13916] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 437.789744][T13920] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @rand_addr, 0x3ff}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f0000000000)) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRES16, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x4000080}, 0x94) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='bbr\x00', 0x4) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$int_out(r2, 0x5460, &(0x7f00000001c0)) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000380)={0xd, 0xbc, {0x52, 0x1, 0x9, {0x9, 0x8}, {0x4, 0x48e7}, @const={0x8, {0x8001, 0x7, 0x2}}}, {0x55, 0x0, 0x0, {}, {0x0, 0x8}, @const={0x0, {0x0, 0x200}}}}) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 10:20:06 executing program 2: 10:20:06 executing program 2: 10:20:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:07 executing program 0: 10:20:07 executing program 3: 10:20:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @rand_addr, 0x3ff}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f0000000000)) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRES16, @ANYBLOB="02002abd7000ffdbdf2508000000240003800800020051000000080002000300000008000300fcffffff08000300010100004c0004800900010073797a31000000003cf8078008000300060000000800030009000000080001000f0000000800040003000000080002006e740000080002000000080008000300ff0100009800018038000400200001000a004e200000000000000000000000000000000000000001f60000001400020002004e24ac1e0101000000000000000008000300060000000e0001006574683a7665746831000000180001006574683a76657468315f766972745f77696669002c00028008000300ff0100000800020000100000080002000104000008000200000000000800040000000080"], 0x11c}, 0x1, 0x0, 0x0, 0x4000080}, 0x94) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='bbr\x00', 0x4) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$int_out(r2, 0x5460, &(0x7f00000001c0)) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000380)={0xd, 0xbc, {0x52, 0x1, 0x9, {0x9, 0x8}, {0x4, 0x48e7}, @const={0x8, {0x8001, 0x7, 0x2}}}, {0x55, 0x0, 0x0, {}, {0x0, 0x8}, @const={0x0, {0x0, 0x200}}}}) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 439.783068][T13949] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 439.808238][T13950] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:08 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:08 executing program 2: 10:20:08 executing program 0: 10:20:08 executing program 3: 10:20:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:09 executing program 3: 10:20:09 executing program 0: 10:20:09 executing program 2: 10:20:09 executing program 1: [ 441.304199][T13970] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 441.362481][T13974] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:09 executing program 2: 10:20:10 executing program 3: 10:20:10 executing program 0: 10:20:10 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:10 executing program 1: 10:20:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:10 executing program 2: 10:20:10 executing program 0: 10:20:10 executing program 3: 10:20:11 executing program 1: [ 442.782924][T13993] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 442.829638][T13998] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:11 executing program 3: 10:20:11 executing program 0: 10:20:11 executing program 2: 10:20:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:11 executing program 1: 10:20:12 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:12 executing program 1: 10:20:12 executing program 0: 10:20:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 444.434372][T14022] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 444.458454][T14023] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:12 executing program 3: 10:20:12 executing program 2: 10:20:13 executing program 1: 10:20:13 executing program 0: [ 444.983444][T14041] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 445.012533][T14042] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:13 executing program 2: 10:20:13 executing program 3: 10:20:13 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:13 executing program 0: 10:20:13 executing program 1: [ 445.560441][T14054] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 445.604978][T14059] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:14 executing program 2: 10:20:14 executing program 3: 10:20:14 executing program 1: 10:20:14 executing program 0: 10:20:14 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:14 executing program 2: 10:20:14 executing program 0: 10:20:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:14 executing program 1: 10:20:14 executing program 3: 10:20:14 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:15 executing program 2: 10:20:15 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9000000010001fff0000", @ANYBLOB], 0x90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xb, 0x75be0100) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0xfc, 0x24, 0xd8b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@TCA_STAB={0xbc, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x81, 0x5, 0x47, 0x6, 0x0, 0x2d13, 0xffff, 0x6}}, {0x10, 0x2, [0x0, 0x6, 0x2, 0xe60e, 0x3, 0x7]}}, {{0x1c, 0x1, {0x1, 0x0, 0xffe1, 0xae, 0x2, 0x5, 0x7aae929e, 0x9}}, {0x16, 0x2, [0x8001, 0x8, 0x100, 0x106, 0x8, 0x800, 0x2, 0x2, 0x1]}}, {{0x1c, 0x1, {0x2, 0x0, 0xffff, 0x8000, 0x1, 0x5, 0x7, 0x6}}, {0x10, 0x2, [0x55, 0x7, 0xe6, 0x7e, 0x2, 0x8]}}, {{0x1c, 0x1, {0x3f, 0x5, 0x0, 0x1ff, 0x0, 0x5, 0x646, 0x5}}, {0xe, 0x2, [0x5, 0x6, 0x0, 0x0, 0x5a89]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xff}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x6}, @qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0xfc}}, 0x0) 10:20:15 executing program 3: creat(0x0, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x4001, 0x3, 0x2f0, 0x0, 0x0, 0x148, 0x0, 0x148, 0x258, 0x240, 0x240, 0x258, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0xf8, 0x160, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0x40000ec, 0x7}}}, @common=@unspec=@mark={{0x30, 'mark\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x2, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x350) [ 446.814483][T14087] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 446.837279][T14088] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MIN_LINKS={0x8}]}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x3}]}, 0x44}}, 0x0) [ 447.013719][T14091] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.0'. 10:20:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setreuid(0x0, 0xffffffffffffffff) 10:20:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000c00)="480e00140000007e5bc5795e8064", 0x0, 0x1a9, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:20:15 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x3c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x23, 0x4, 0x1, 0x0, r1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r2, &(0x7f0000000540)}, 0x20) 10:20:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:16 executing program 3: unshare(0x2a000400) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x2, 0x4000000000080, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0xfffffffc}, 0x40) 10:20:16 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 10:20:16 executing program 0: memfd_create(&(0x7f0000000580)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) [ 448.620774][T14141] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 448.639975][T14146] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:18 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:18 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000c00)="480e00140000007e5bc5795e8064", 0x0, 0x1a9, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 10:20:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x54) 10:20:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) 10:20:18 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r0, r1) 10:20:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 450.204966][T14174] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 450.221331][T14176] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040), 0x4) 10:20:18 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0x4, [@enum={0x0, 0x9, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xce4e}]}, @struct={0x0, 0xb, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @enum]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 10:20:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) 10:20:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=@newtaction={0x60, 0x30, 0x1, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x60}}, 0x0) [ 450.816486][T14188] ptrace attach of "/root/syz-executor.0"[14187] was attempted by "/root/syz-executor.0"[14188] 10:20:19 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18"], 0x18}, 0x0) 10:20:19 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)="4227f9955517c96052ec15a97523ec34e5dd16c9b2174b10b49d7c14b2c4b158e19b980ae371e6d43692a1", 0x2b}, {&(0x7f0000000280)="d1934470453243241a2b008a14806fe3c1836f78b2d70120582e73f0553b7d1eb3481a7589e33e52c0d8fb0be9690e0c2d87eb690e859215d6954c8f3865bfb591bd427e0a0899", 0x47}, {&(0x7f0000000100)="4a0ae97bad82eb6921c52a1cb009d2d16c7e5faa691d124b7a3e932d498ce5816699a0de449e24911700f87894f78fa741309a63b6276095a6c7c71f5535bfc71fc506", 0x43}, {0x0}], 0x4, 0x81805) msgget(0x0, 0x8) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) pipe(&(0x7f00000001c0)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) sendfile(r0, r0, 0x0, 0x24002d00) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x48000020, r2, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), r2, 0x0, 0x7, 0x2) ioctl$LOOP_CLR_FD(r0, 0x4c01) r3 = creat(0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="2302766f0d80070002000000edff06c37c02688d1d56516abb7ecab26a6008"], 0x3e) close(r3) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000400)=""/201) [ 451.464996][ T2962] blk_update_request: I/O error, dev loop0, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 451.476385][ T2962] Buffer I/O error on dev loop0, logical block 0, lost async page write 10:20:20 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:20 executing program 1: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 10:20:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000012580)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000098c0)=""/164, 0xa4}, {&(0x7f0000009a80)=""/133, 0x85}, {&(0x7f0000009b40)=""/149, 0x95}, {&(0x7f0000009cc0)=""/40, 0x28}, {&(0x7f0000009d00)=""/171, 0xab}, {&(0x7f0000009dc0)=""/155, 0x9b}, {&(0x7f0000009e80)=""/4096, 0x1000}], 0x7}, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 10:20:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 10:20:20 executing program 3: r0 = memfd_create(&(0x7f0000000000)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x0) ftruncate(r0, 0x1000000) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r1, r0, 0x0, 0xeefffdef) [ 452.414338][T14223] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 452.432758][T14225] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400c00) 10:20:21 executing program 2: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@noquota='noquota'}, {@commit={'commit', 0x3d, 0x5}}]}) 10:20:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() poll(0x0, 0x0, 0xfffffffffffffff8) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) tkill(r0, 0x33) [ 453.058642][T14234] gfs2: not a GFS2 filesystem 10:20:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="38000000010201020000000000000000000000002400018014000180080001000000000008000200ac1e00010c000280050001"], 0x38}}, 0x0) 10:20:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @mss, @window, @mss, @timestamp, @window={0x3, 0xfff}], 0x2000019f) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000640)="e046385738d0b6e2f17050c3002a9fe3e2f4bbc226e39bf35204d275a8fadde37aab3905bbacaf04d57fb246d660ea69d755b5fa4e9dcdda9919e7cfdd2fd6f2ffd8ca8b450d8b0646e2d9363d42c096c630e57a2bfd2c36cec695821437e9d3554f3eb5c048236b4b4adb7e302a1588fa2daa0101000000000000f38fe3b4bded81207efe8fd987bd3b2cc76b79deb96df13c5456630d4cfb858f6dbcdd4f199a5164ba2fde0014d7f98d9251bbc07bca2b671030", 0xb5, 0x0, 0x0, 0x0) [ 453.889082][T14257] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 453.931056][T14259] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 454.469283][ T0] NOHZ: local_softirq_pending 08 10:20:23 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:23 executing program 0: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="e8"], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@remote, 0x50, r1}) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8916, &(0x7f0000000000)) ioctl(r2, 0x8936, &(0x7f0000000000)) 10:20:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, 0x0) 10:20:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000002240)='/dev/vcsa#\x00', 0x1000, 0x0) dup2(r0, r1) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x8912, &(0x7f0000000140)={'ip6_vti0\x00', 0x0}) 10:20:23 executing program 3: 10:20:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:23 executing program 0: [ 455.492221][T14282] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 455.524218][T14285] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:24 executing program 3: 10:20:24 executing program 2: 10:20:24 executing program 3: 10:20:24 executing program 0: 10:20:24 executing program 2: 10:20:26 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 458.439790][T14314] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 458.505051][T14316] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:29 executing program 1: 10:20:29 executing program 3: 10:20:29 executing program 0: 10:20:29 executing program 2: 10:20:29 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 461.514893][T14329] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 461.541176][T14330] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:30 executing program 0: 10:20:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) 10:20:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000740)) 10:20:30 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff7e) 10:20:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = dup(r2) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x7fff) [ 462.082415][ T31] audit: type=1804 audit(1595326830.481:29): pid=14339 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir919080150/syzkaller.endD0u/199/bus" dev="sda1" ino=16381 res=1 10:20:30 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) 10:20:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 462.586712][T14346] new mount options do not match the existing superblock, will be ignored [ 462.711217][T14350] new mount options do not match the existing superblock, will be ignored [ 462.787166][ T31] audit: type=1804 audit(1595326831.192:30): pid=14340 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir919080150/syzkaller.endD0u/199/bus" dev="sda1" ino=16381 res=1 [ 462.953932][ T31] audit: type=1804 audit(1595326831.242:31): pid=14352 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir919080150/syzkaller.endD0u/199/bus" dev="sda1" ino=16381 res=1 [ 462.978593][ T31] audit: type=1804 audit(1595326831.272:32): pid=14352 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir919080150/syzkaller.endD0u/199/bus" dev="sda1" ino=16381 res=1 [ 463.089132][T14360] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 463.100141][T14361] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:31 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 10:20:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r1, &(0x7f00000043c0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/159, 0x9f}], 0x1}}, {{0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 10:20:31 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x0) 10:20:33 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(0xffffffffffffffff, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) writev(r0, &(0x7f0000000880)=[{&(0x7f0000000400)="27053f4d454af723efd67e578aee3052fb9e7ced354e7eca17841e2c7588a75d7b2300f7c5323ae86a3ed68184ee6f68e365c9fb710e38c4dfc434c35ef931cf6eb9ae638e77957a21dbd7", 0x4b}, {&(0x7f00000004c0)}, {0x0}, {0x0}], 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000000)='./bus\x00', 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:20:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:33 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x400000000000000}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) r2 = creat(&(0x7f0000000040)='./bus\x00', 0xa) fcntl$setstatus(r2, 0x4, 0x46000) lseek(r2, 0x4200, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, &(0x7f0000000100), 0x8080ffffff7e) 10:20:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x185, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x4c}}, 0x0) 10:20:33 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 465.227351][ T31] audit: type=1804 audit(1595326833.632:33): pid=14418 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir919080150/syzkaller.endD0u/201/bus" dev="sda1" ino=16363 res=1 10:20:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="b702000000400400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040000010000001704000009000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000a93e90832ff9d40a409f01f6147c8f6fd267bf410e76c540106f89ec68823ce3c4bcc4ce81e97719ea969f2a019a6137ad1efc966f1cfdc4ea29f673efc20c07ec082bc6de68ab0a5ebf4ee60253516cc871311ab25868e1d9a014263697ca83c57fc2ead0d85a2bcc922a3aa71489fa000000004bcff56cf5a84cefb43ea72351190a711fd2b83a3596d80729476ab7140606791e81960ea313ea74c2cde2dedd424a4596f98e3e70a6f1d8abce75f01dbb60bdf7316a4fed35f16ae8b3aa4c6dd4880c76e5837f39a161b050abc5a34588ea19114caebb79951084e7113c77ae25a0121de52e5e8cceddf2cb4b9895a592558509d6bc95bfb57834fdb2b8c0738fda3ea38c09e75b1f39ae8af2c746fbb43e3530767d8ee296487c0e650ead90030000008fee2e02ece680c0d3d19b2b62fc202240219f497e89548a2977f86137ecb5753dfc87f148ed2392ef113cbe241a98b4e8f3bf878f1dc0e115ddfe318f54369bc8dfd3a4ea21259ed518ae80606ef83d69b9d0d972b2211d05b2e31d61bf49ca69bdb022a6cff57d5f16769d1605e8045c6880b425f8575f863a7e1b7174281ab87fba93555853df9dbd3da536d88168217230eabfaf7ff9b0146acffea06f3b0ba7b7357ba84c953523e92ee8cc4d8be0050000002c305d59cb68bff089979504c71418bd62ec60cfae7d75ce2adc8d4b2eabae5937b47e07da3f62be170ac03ca60b10c8123a7ae9165c2544e3b50acd3b00000000000d62fae930c2308e2401bb761565ac4eda4ca118ebbe000000000000000000000000000000a52d598dbcfeb90dd310175435c843624be9698bcd550c272c391cf24ea56d016e1f21b5999e1448f8784db63fd4f36ec14cc67fcdd41c8ba146dc7d3fb07df9687b95efcd74ad8d0b15234dab4da83fa33391a2925b49f6040087cfaa9f83a6cdb0e031d9eb6cbff6eba616992f3ba6c277e7820a84365d650bbf057394a543c3210df7268ec32ac38db9d3062571ec8eb3290bb4a823674e89cf1716d4bc9fac0c47d854632a1d943a9dc58e6f4d0b687a055983a46fdd52f3c87506ae419c604f62b56ad1420eca5484ee0092563332124c612f00"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = timerfd_create(0x0, 0x0) close(r2) 10:20:34 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(0xffffffffffffffff, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) [ 465.855745][T14431] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 465.885478][T14432] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 465.953658][ T31] audit: type=1804 audit(1595326834.352:34): pid=14434 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir919080150/syzkaller.endD0u/201/bus" dev="sda1" ino=16363 res=1 10:20:34 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:34 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb, 0x1, 'multiq\x00'}, {0x8}}]}, 0x38}}, 0x0) 10:20:34 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff770000000200040000009600000000000000a4000000000000000000", 0xffffffe5}], 0x2) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:35 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(0xffffffffffffffff, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 466.644239][T14453] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 466.724827][T14453] device bond3 entered promiscuous mode [ 466.731328][T14453] 8021q: adding VLAN 0 to HW filter on device bond3 10:20:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 466.975375][T14456] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 467.168717][T14500] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 467.212273][T14527] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 467.228508][T14456] device bond4 entered promiscuous mode [ 467.235073][T14456] 8021q: adding VLAN 0 to HW filter on device bond4 10:20:35 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:35 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1e, 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000002200)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 10:20:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:35 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:36 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[], 0xb4}}, 0x0) 10:20:36 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 468.212584][T14564] overlayfs: unrecognized mount option "\" or missing value [ 468.245208][T14566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14566 comm=syz-executor.3 [ 468.263899][T14564] overlayfs: unrecognized mount option "\" or missing value 10:20:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 468.301768][T14569] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14569 comm=syz-executor.3 10:20:36 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[], 0xb4}}, 0x0) 10:20:36 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) writev(r0, &(0x7f0000000880)=[{&(0x7f0000000280)="abe1fbe93ea881e6055123fd1fe5f5d062b6818de4fb7f3ef48efb750b1d5c84253b83ed24a270c54306f0a5d358d2635bcbd7ba83ef4496afa8c7296a16a57e623fb61441ff95026242229bf9d7ac9e87bf794bdc20ccf5bc0e03f7fd11a0", 0x5f}, {&(0x7f0000000400)}, {0x0}, {0x0}], 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) 10:20:37 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[], 0xb4}}, 0x0) [ 468.648602][T14577] overlayfs: unrecognized mount option "\" or missing value 10:20:37 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) [ 468.728777][T14581] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 468.804943][T14585] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:37 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:37 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[], 0xb4}}, 0x0) [ 469.160640][T14595] overlayfs: unrecognized mount option "\" or missing value [ 469.180894][T14596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14596 comm=syz-executor.3 10:20:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 469.570384][T14609] overlayfs: unrecognized mount option "\" or missing value [ 469.607721][T14611] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14611 comm=syz-executor.3 10:20:38 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x10, 0x8000000000000003, 0x0) 10:20:38 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 469.968304][T14617] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 469.981766][T14619] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:38 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 10:20:38 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) [ 470.225495][T14626] overlayfs: unrecognized mount option "\" or missing value 10:20:38 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 470.431959][T14631] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 470.450373][T14635] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, 0x0, 0x0) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:39 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) [ 470.682927][T14640] overlayfs: unrecognized mount option "\" or missing value 10:20:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = timerfd_create(0x8, 0x0) timerfd_settime(r2, 0x3, &(0x7f0000000000)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) 10:20:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, 0x0, 0x0) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:39 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) socket$unix(0x1, 0x2, 0x0) [ 471.053254][T14651] overlayfs: unrecognized mount option "\" or missing value [ 471.329079][T14661] overlayfs: unrecognized mount option "\" or missing value 10:20:40 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, 0x0, 0x0) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:40 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) socket$unix(0x1, 0x2, 0x0) 10:20:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) setresuid(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:40 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:40 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001000010000000008000000000000000a60000000000a01010000000000000000020000080900010073797a30000000000900010073797a300000000008000240000000010c0004400000000000000005090001007330fed758ec4a744d000240000000010900010073797a30000000008c000000030a0102000000000000000002000000090001"], 0x1}}, 0x0) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) [ 471.870161][T14675] __nla_validate_parse: 4 callbacks suppressed [ 471.870189][T14675] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 471.887269][T14675] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.1'. [ 471.923550][T14673] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 471.946026][T14678] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 471.969767][T14681] overlayfs: unrecognized mount option "\" or missing value 10:20:40 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) socket$unix(0x1, 0x2, 0x0) 10:20:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) 10:20:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) setresuid(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 472.574044][T14693] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 472.604926][T14696] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 472.791178][T14700] overlayfs: unrecognized mount option "\" or missing value 10:20:41 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) [ 473.345821][T14708] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 473.360529][T14710] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:42 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:42 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) setresuid(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(0x0, 0x0) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=.']) 10:20:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:42 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) [ 474.626510][T14725] overlayfs: unrecognized mount option "\" or missing value 10:20:43 executing program 3: mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 474.692513][T14723] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:43 executing program 1: 10:20:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 474.785294][T14731] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 475.119012][T14744] overlayfs: unrecognized mount option "\" or missing value 10:20:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:43 executing program 1: 10:20:44 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x10, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:44 executing program 3: mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:44 executing program 1: 10:20:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="b702000000400400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040000010000001704000009000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000a93e90832ff9d40a409f01f6147c8f6fd267bf410e76c540106f89ec68823ce3c4bcc4ce81e97719ea969f2a019a6137ad1efc966f1cfdc4ea29f673efc20c07ec082bc6de68ab0a5ebf4ee60253516cc871311ab25868e1d9a014263697ca83c57fc2ead0d85a2bcc922a3aa71489fa000000004bcff56cf5a84cefb43ea72351190a711fd2b83a3596d80729476ab7140606791e81960ea313ea74c2cde2dedd424a4596f98e3e70a6f1d8abce75f01dbb60bdf7316a4fed35f16ae8b3aa4c6dd4880c76e5837f39a161b050abc5a34588ea19114caebb79951084e7113c77ae25a0121de52e5e8cceddf2cb4b9895a592558509d6bc95bfb57834fdb2b8c0738fda3ea38c09e75b1f39ae8af2c746fbb43e3530767d8ee296487c0e650ead90030000008fee2e02ece680c0d3d19b2b62fc202240219f497e89548a2977f86137ecb5753dfc87f148ed2392ef113cbe241a98b4e8f3bf878f1dc0e115ddfe318f54369bc8dfd3a4ea21259ed518ae80606ef83d69b9d0d972b2211d05b2e31d61bf49ca69bdb022a6cff57d5f16769d1605e8045c6880b425f8575f863a7e1b7174281ab87fba93555853df9dbd3da536d88168217230eabfaf7ff9b0146acffea06f3b0ba7b7357ba84c953523e92ee8cc4d8be0050000002c305d59cb68bff089979504c71418bd62ec60cfae7d75ce2adc8d4b2eabae5937b47e07da3f62be170ac03ca60b10c8123a7ae9165c2544e3b50acd3b00000000000d62fae930c2308e2401bb761565ac4eda4ca118ebbe000000000000000000000000000000a52d598dbcfeb90dd310175435c843624be9698bcd550c272c391cf24ea56d016e1f21b5999e1448f8784db63fd4f36ec14cc67fcdd41c8ba146dc7d3fb07df9687b95efcd74ad8d0b15234dab4da83fa33391a2925b49f6040087cfaa9f83a6cdb0e031d9eb6cbff6eba616992f3ba6c277e7820a84365d650bbf057394a543c3210df7268ec32ac38db9d3062571ec8eb3290bb4a823674e89cf1716d4bc9fac0c47d854632a1d943a9dc58e6f4d0b687a055983a46fdd52f3c87506ae419c604f62b56ad1420eca5484ee0092563332124c612f00"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:44 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) [ 476.229658][T14769] overlayfs: unrecognized mount option "\" or missing value 10:20:44 executing program 1: 10:20:44 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x10, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:45 executing program 3: mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="b702000000400400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040000010000001704000009000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000a93e90832ff9d40a409f01f6147c8f6fd267bf410e76c540106f89ec68823ce3c4bcc4ce81e97719ea969f2a019a6137ad1efc966f1cfdc4ea29f673efc20c07ec082bc6de68ab0a5ebf4ee60253516cc871311ab25868e1d9a014263697ca83c57fc2ead0d85a2bcc922a3aa71489fa000000004bcff56cf5a84cefb43ea72351190a711fd2b83a3596d80729476ab7140606791e81960ea313ea74c2cde2dedd424a4596f98e3e70a6f1d8abce75f01dbb60bdf7316a4fed35f16ae8b3aa4c6dd4880c76e5837f39a161b050abc5a34588ea19114caebb79951084e7113c77ae25a0121de52e5e8cceddf2cb4b9895a592558509d6bc95bfb57834fdb2b8c0738fda3ea38c09e75b1f39ae8af2c746fbb43e3530767d8ee296487c0e650ead90030000008fee2e02ece680c0d3d19b2b62fc202240219f497e89548a2977f86137ecb5753dfc87f148ed2392ef113cbe241a98b4e8f3bf878f1dc0e115ddfe318f54369bc8dfd3a4ea21259ed518ae80606ef83d69b9d0d972b2211d05b2e31d61bf49ca69bdb022a6cff57d5f16769d1605e8045c6880b425f8575f863a7e1b7174281ab87fba93555853df9dbd3da536d88168217230eabfaf7ff9b0146acffea06f3b0ba7b7357ba84c953523e92ee8cc4d8be0050000002c305d59cb68bff089979504c71418bd62ec60cfae7d75ce2adc8d4b2eabae5937b47e07da3f62be170ac03ca60b10c8123a7ae9165c2544e3b50acd3b00000000000d62fae930c2308e2401bb761565ac4eda4ca118ebbe000000000000000000000000000000a52d598dbcfeb90dd310175435c843624be9698bcd550c272c391cf24ea56d016e1f21b5999e1448f8784db63fd4f36ec14cc67fcdd41c8ba146dc7d3fb07df9687b95efcd74ad8d0b15234dab4da83fa33391a2925b49f6040087cfaa9f83a6cdb0e031d9eb6cbff6eba616992f3ba6c277e7820a84365d650bbf057394a543c3210df7268ec32ac38db9d3062571ec8eb3290bb4a823674e89cf1716d4bc9fac0c47d854632a1d943a9dc58e6f4d0b687a055983a46fdd52f3c87506ae419c604f62b56ad1420eca5484ee0092563332124c612f00"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:45 executing program 1: [ 476.973518][T14792] overlayfs: unrecognized mount option "\" or missing value 10:20:45 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x10, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:45 executing program 2: ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000140)=0x1) readv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:45 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:45 executing program 1: [ 477.625832][T14811] __nla_validate_parse: 4 callbacks suppressed [ 477.625863][T14811] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 477.648430][T14813] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 477.782015][T14819] overlayfs: unrecognized mount option "\" or missing value 10:20:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:46 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:46 executing program 2: ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000140)=0x1) readv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:46 executing program 1: 10:20:46 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 478.296249][T14832] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 478.320973][T14836] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:46 executing program 1: 10:20:46 executing program 2: ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000140)=0x1) readv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:46 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 478.531038][T14838] overlayfs: unrecognized mount option "\" or missing value 10:20:47 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:47 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:47 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:47 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:47 executing program 1: 10:20:47 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) [ 479.268944][T14861] overlayfs: unrecognized mount option "\" or missing value 10:20:47 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:47 executing program 1: 10:20:47 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:48 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) [ 479.704149][T14877] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 479.730720][T14878] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:48 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:48 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:48 executing program 1: 10:20:48 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setresuid(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:49 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:49 executing program 1: 10:20:49 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:49 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', 0x0, 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:49 executing program 1: getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000000), &(0x7f0000000080)=0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r4, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r5, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r6 = openat$hwrng(0xffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) ioctl$FICLONE(r5, 0x40049409, r6) dup3(r1, r2, 0x0) dup2(r0, r3) 10:20:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setresuid(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:49 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', 0x0, 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 481.121015][T14914] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 481.132341][T14916] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:50 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:50 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', 0x0, 0x0, &(0x7f0000000400)={[], [], 0x5c}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setresuid(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:50 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() capget(&(0x7f0000000040)={0x19980330, r0}, &(0x7f0000000080)={0x0, 0x0, 0xffffffff, 0x7}) 10:20:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:50 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:50 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 482.371247][T14961] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 482.381805][T14962] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 482.511770][T14967] overlayfs: missing 'lowerdir' 10:20:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xa, 0x9, 0x4, 0x7, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000000), 0x7, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000480), 0x0, 0x1, r0}, 0x38) 10:20:50 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 10:20:51 executing program 3: clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='overlay\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 482.760500][T14973] overlayfs: missing 'lowerdir' 10:20:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 483.094795][T14980] overlayfs: missing 'lowerdir' 10:20:51 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800007, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 10:20:51 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) socket$nl_generic(0x10, 0x3, 0x10) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002d00) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:20:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) 10:20:51 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000140)=0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 483.882410][T15002] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 483.904357][T14994] blk_update_request: I/O error, dev loop0, sector 512 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 483.944851][T15010] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 484.086847][T14994] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 10:20:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x5251}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @ioapic={0x1f000, 0xfffffffc}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:20:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="b702000000400400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040000010000001704000009000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000a93e90832ff9d40a409f01f6147c8f6fd267bf410e76c540106f89ec68823ce3c4bcc4ce81e97719ea969f2a019a6137ad1efc966f1cfdc4ea29f673efc20c07ec082bc6de68ab0a5ebf4ee60253516cc871311ab25868e1d9a014263697ca83c57fc2ead0d85a2bcc922a3aa71489fa000000004bcff56cf5a84cefb43ea72351190a711fd2b83a3596d80729476ab7140606791e81960ea313ea74c2cde2dedd424a4596f98e3e70a6f1d8abce75f01dbb60bdf7316a4fed35f16ae8b3aa4c6dd4880c76e5837f39a161b050abc5a34588ea19114caebb79951084e7113c77ae25a0121de52e5e8cceddf2cb4b9895a592558509d6bc95bfb57834fdb2b8c0738fda3ea38c09e75b1f39ae8af2c746fbb43e3530767d8ee296487c0e650ead90030000008fee2e02ece680c0d3d19b2b62fc202240219f497e89548a2977f86137ecb5753dfc87f148ed2392ef113cbe241a98b4e8f3bf878f1dc0e115ddfe318f54369bc8dfd3a4ea21259ed518ae80606ef83d69b9d0d972b2211d05b2e31d61bf49ca69bdb022a6cff57d5f16769d1605e8045c6880b425f8575f863a7e1b7174281ab87fba93555853df9dbd3da536d88168217230eabfaf7ff9b0146acffea06f3b0ba7b7357ba84c953523e92ee8cc4d8be0050000002c305d59cb68bff089979504c71418bd62ec60cfae7d75ce2adc8d4b2eabae5937b47e07da3f62be170ac03ca60b10c8123a7ae9165c2544e3b50acd3b00000000000d62fae930c2308e2401bb761565ac4eda4ca118ebbe000000000000000000000000000000a52d598dbcfeb90dd310175435c843624be9698bcd550c272c391cf24ea56d016e1f21b5999e1448f8784db63fd4f36ec14cc67fcdd41c8ba146dc7d3fb07df9687b95efcd74ad8d0b15234dab4da83fa33391a2925b49f6040087cfaa9f83a6cdb0e031d9eb6cbff6eba616992f3ba6c277e7820a84365d650bbf057394a543c3210df7268ec32ac38db9d3062571ec8eb3290bb4a823674e89cf1716d4bc9fac0c47d854632a1d943a9dc58e6f4d0b687a055983a46fdd52f3c87506ae419c604f62b56ad1420eca5484ee0092563332124c612f00"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:52 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) socket$nl_generic(0x10, 0x3, 0x10) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002d00) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:20:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:53 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @multicast1}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}}]}, 0x48}}, 0x0) [ 484.799076][T15028] blk_update_request: I/O error, dev loop0, sector 256 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 10:20:53 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) socket$nl_generic(0x10, 0x3, 0x10) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002d00) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:20:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_ENCAP_FLAGS={0x6}]}}}]}, 0x40}}, 0x0) [ 485.336885][T15046] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 485.359390][T15047] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:53 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f00000000c0)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='yeah\x00', 0x5) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a}, 0x1c) 10:20:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:54 executing program 5: syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000001c0)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0x40047211, &(0x7f0000000080)) [ 485.600645][ T2961] blk_update_request: I/O error, dev loop0, sector 128 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 485.612398][ T2961] Buffer I/O error on dev loop0, logical block 16, lost async page write 10:20:54 executing program 1: socket$inet6(0xa, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6a9b4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) 10:20:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:20:54 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) 10:20:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:54 executing program 5: add_key$fscrypt_provisioning(&(0x7f00000000c0)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0100000000000000ebed2f1b4b90c125f7b7744911a9b651f92431d5ea846566a255"], 0x44, 0xfffffffffffffff9) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8020001) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x6e) write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b) fdatasync(r0) 10:20:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 486.669288][T15086] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 486.697138][T15089] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:20:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000004c0)='illinois\x00', 0x9) sendmmsg(r0, &(0x7f0000001500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="c43d4184d0edc9ae8fffc35c43f1e77708cf4309eb18105f53054b3d3a5d157ac070c290c4abedfd83ab2a55e23dd12899c1cf4288df0abdf1e0a8b3f7381828b167173b2a42c37a8abb95d9b15ced3267c3fdf0ffce6f43452c4861f32dfbc953c5ba8738e842a985c9131305417700cf9a770000000000f1a9e2921f8ba90b55e267a320ed7d7ad3d68a6b20afe0743c3254d58466947deb22cc39eabe6c6786013c7e6870cf38aba697d833e7bde2fbf0fefd5e0efdbfbd91ec", 0xbb}, {&(0x7f0000000500)="b9fd06fcb6f5f4d1470de33b0896891349f175543edb59eca76fa3b8f8b8724ad4d0e34fe3ca4d7753abdac5d87bb1e17d2bb9f40538a41686715698637eaf697abd776d584f0c5e809459ff5aecd1978bda00000000000000000000000000a4cb3f671c02592abc6c76f33bb78c60605aa298a60a81d9ad90055f8b9a1dc92bcbd2349b66ab03948e2a9499b516d72f7a27696da77fd46055e60ee5ffa836170f69278b34018de8f9fe6d43432450b16f420b4a0aa7c96b73e61a1eb5424a6858402ac962aa2a117a3eaf72c06a72755015ec89e3160d453e71a89dcf9fbcf0f005f031c4b4b6b170e3dec4a07cab395a", 0xf1}, {&(0x7f0000000000)="9e43a32ed5ea4dc5fc81e1378994991ed760bf05a1", 0x15}, {0x0}], 0x4}}], 0x1, 0x0) 10:20:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000002200)=""/165, 0xa5}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x1c1, 0x0) 10:20:55 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 10:20:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 487.267122][T15105] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:20:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) 10:20:55 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/147, 0x93}], 0x1) [ 487.400981][T15105] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:20:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffb}]}) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:20:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000002200)=""/165, 0xa5}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x1c1, 0x0) 10:20:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/dev_mcast\x00') r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x4000000000dc) 10:20:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 10:20:56 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x48, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x48}}, 0x0) 10:20:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/914], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:20:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) listen(0xffffffffffffffff, 0xffffff01) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x100001) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ac00000004080c0000070900010073797a31000000800114c19c080002407d09bc1ea3c3b2400000000808000240000001010800024000000002080001407f1ec9000000000000fbfffff9080002400000010008000240000000080600024093fa000017000300950000001400048008000240000000810800024000000006090001007379dcf23d1200000c000480080003400000001800"/162], 0xac}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x8, 0x20, 0x1}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x4001) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\x00\x00%\xfc\vw\n\xec\xee_\xef\xed\x81\xd0\x9dJ\xbex\xd4\x98Ne\x9d#\xbb\xe7Sm\x8c;z8\x16#\x8b\x9f\xf5\xdb\xc2\x1a\x90\x03s\xf4y\xca\x88+\xccC\xbc\x99L\xbaLeV\"\xab\xb2\xb0\xa4\xc0p\xc3\x86J\xee\xf4P\xa4(\xe46<\xae\xfe\x9c\xe7\xd1\x03\xfc\xcb\xeb:-\x97\x1f.\x06\x92\x92\x16j\xbf^\x81\x17\xbb3^\x87\xee*-\a-\xe3\x03\xeaW\xa1\xb9[\x86\xfa\x17BY\xea\x16H\x947{\x1c\x1a<\v\v\x1e&\x99[\x95\xb0C|A\xb9\xb5\x01\xab\xf6\x17\x05\\\xe7Hi|\xd3$\xf8z\x0f\xc6\x8bS{\x9b\x1c-o/,\x04+9\xa81JdA\xa1\x93\x92\x1e v_\x02C\xce\xa7\x8d\x91\x99;[\xbaw\x92\x92\xa2\x88\xff\xbe\x0fK\xd0\xd7\xb4?\xcf\xd1\xa3Sn?\x97V\x92\xa4\xdf\x1a]\xfd\xb5\x9d\x82\xa0\x0f\xeb\a\x17\xe4U\x16\xe2\xd7eSn\xdf\xb9_Wg\xfb0\xc3C\x9a$\xc2\xc0q5\x1e2\x06\xfd/\x14\xb8', 0xf) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000040)="1f0000001000ff0d040000000100130423dcff0900"/31, 0x1f) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000007051900000000000000000100000a0900010073797a31000000000c00024000000000000000090c00024000000000000000810c000640000000000000000700ffffffff00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x302c66f6becc774a}, 0x20040804) [ 488.516052][T15139] ===================================================== [ 488.523043][T15139] BUG: KMSAN: uninit-value in selinux_netlink_send+0x413/0xba0 [ 488.530599][T15139] CPU: 0 PID: 15139 Comm: syz-executor.3 Not tainted 5.8.0-rc5-syzkaller #0 [ 488.539269][T15139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.549323][T15139] Call Trace: [ 488.552621][T15139] dump_stack+0x1df/0x240 [ 488.556979][T15139] kmsan_report+0xf7/0x1e0 [ 488.561423][T15139] __msan_warning+0x58/0xa0 [ 488.565941][T15139] selinux_netlink_send+0x413/0xba0 [ 488.571168][T15139] ? kmsan_get_metadata+0x11d/0x180 [ 488.576377][T15139] ? kmsan_get_metadata+0x11d/0x180 [ 488.581588][T15139] ? selinux_vm_enough_memory+0x1a0/0x1a0 [ 488.587314][T15139] security_netlink_send+0xef/0x1e0 [ 488.592533][T15139] netlink_sendmsg+0x1008/0x14d0 [ 488.597517][T15139] ? netlink_getsockopt+0x1440/0x1440 [ 488.602894][T15139] kernel_sendmsg+0x433/0x440 [ 488.607606][T15139] sock_no_sendpage+0x235/0x300 [ 488.612490][T15139] ? sock_no_mmap+0x30/0x30 [ 488.617008][T15139] sock_sendpage+0x1e1/0x2c0 [ 488.621627][T15139] pipe_to_sendpage+0x38c/0x4c0 [ 488.626492][T15139] ? sock_fasync+0x250/0x250 [ 488.631109][T15139] __splice_from_pipe+0x565/0xf00 [ 488.636147][T15139] ? generic_splice_sendpage+0x2d0/0x2d0 [ 488.641815][T15139] generic_splice_sendpage+0x1d5/0x2d0 [ 488.647302][T15139] ? iter_file_splice_write+0x1800/0x1800 [ 488.653026][T15139] direct_splice_actor+0x1fd/0x580 [ 488.658156][T15139] ? kmsan_get_metadata+0x4f/0x180 [ 488.663283][T15139] splice_direct_to_actor+0x6b2/0xf50 [ 488.668662][T15139] ? do_splice_direct+0x580/0x580 [ 488.673733][T15139] do_splice_direct+0x342/0x580 [ 488.678618][T15139] do_sendfile+0x101b/0x1d40 [ 488.683267][T15139] __se_compat_sys_sendfile+0x301/0x3c0 [ 488.688828][T15139] ? kmsan_get_metadata+0x11d/0x180 [ 488.694034][T15139] ? __ia32_sys_sendfile64+0x70/0x70 [ 488.699326][T15139] __ia32_compat_sys_sendfile+0x56/0x70 [ 488.704884][T15139] __do_fast_syscall_32+0x2aa/0x400 [ 488.710104][T15139] do_fast_syscall_32+0x6b/0xd0 [ 488.714968][T15139] do_SYSENTER_32+0x73/0x90 [ 488.719501][T15139] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 488.725828][T15139] RIP: 0023:0xf7fe2549 [ 488.729885][T15139] Code: Bad RIP value. [ 488.733949][T15139] RSP: 002b:00000000f5ddd0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 488.742359][T15139] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000000003 [ 488.750331][T15139] RDX: 0000000000000000 RSI: 00000000000000dc RDI: 0000000000000000 [ 488.758301][T15139] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 488.766281][T15139] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 488.774251][T15139] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 488.782252][T15139] [ 488.784574][T15139] Uninit was stored to memory at: [ 488.789609][T15139] kmsan_internal_chain_origin+0xad/0x130 [ 488.795326][T15139] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 488.801651][T15139] kmsan_memcpy_metadata+0xb/0x10 [ 488.806672][T15139] __msan_memcpy+0x43/0x50 [ 488.811088][T15139] _copy_from_iter_full+0xbfe/0x13b0 [ 488.816374][T15139] netlink_sendmsg+0xfaa/0x14d0 [ 488.821223][T15139] kernel_sendmsg+0x433/0x440 [ 488.825896][T15139] sock_no_sendpage+0x235/0x300 [ 488.830750][T15139] sock_sendpage+0x1e1/0x2c0 [ 488.835342][T15139] pipe_to_sendpage+0x38c/0x4c0 [ 488.840189][T15139] __splice_from_pipe+0x565/0xf00 [ 488.845214][T15139] generic_splice_sendpage+0x1d5/0x2d0 [ 488.850671][T15139] direct_splice_actor+0x1fd/0x580 [ 488.855782][T15139] splice_direct_to_actor+0x6b2/0xf50 [ 488.861150][T15139] do_splice_direct+0x342/0x580 [ 488.866000][T15139] do_sendfile+0x101b/0x1d40 [ 488.870671][T15139] __se_compat_sys_sendfile+0x301/0x3c0 [ 488.876219][T15139] __ia32_compat_sys_sendfile+0x56/0x70 [ 488.881765][T15139] __do_fast_syscall_32+0x2aa/0x400 [ 488.886964][T15139] do_fast_syscall_32+0x6b/0xd0 [ 488.891815][T15139] do_SYSENTER_32+0x73/0x90 [ 488.896318][T15139] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 488.902628][T15139] [ 488.904951][T15139] Uninit was created at: [ 488.909215][T15139] kmsan_save_stack_with_flags+0x3c/0x90 [ 488.914889][T15139] kmsan_alloc_page+0xb9/0x180 [ 488.919651][T15139] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 488.925195][T15139] alloc_pages_current+0x672/0x990 [ 488.930302][T15139] push_pipe+0x605/0xb70 [ 488.934541][T15139] iov_iter_get_pages_alloc+0x18a9/0x21c0 [ 488.941214][T15139] do_splice_to+0x4fc/0x14f0 [ 488.945822][T15139] splice_direct_to_actor+0x45c/0xf50 [ 488.951191][T15139] do_splice_direct+0x342/0x580 [ 488.956043][T15139] do_sendfile+0x101b/0x1d40 [ 488.960631][T15139] __se_compat_sys_sendfile+0x301/0x3c0 [ 488.966196][T15139] __ia32_compat_sys_sendfile+0x56/0x70 [ 488.971741][T15139] __do_fast_syscall_32+0x2aa/0x400 [ 488.976944][T15139] do_fast_syscall_32+0x6b/0xd0 [ 488.981841][T15139] do_SYSENTER_32+0x73/0x90 [ 488.986343][T15139] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 488.992660][T15139] ===================================================== [ 488.999584][T15139] Disabling lock debugging due to kernel taint [ 489.005730][T15139] Kernel panic - not syncing: panic_on_warn set ... [ 489.012327][T15139] CPU: 0 PID: 15139 Comm: syz-executor.3 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 489.022376][T15139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.032429][T15139] Call Trace: [ 489.035736][T15139] dump_stack+0x1df/0x240 [ 489.040085][T15139] panic+0x3d5/0xc3e [ 489.044029][T15139] kmsan_report+0x1df/0x1e0 [ 489.048542][T15139] __msan_warning+0x58/0xa0 [ 489.053070][T15139] selinux_netlink_send+0x413/0xba0 [ 489.058295][T15139] ? kmsan_get_metadata+0x11d/0x180 [ 489.063504][T15139] ? kmsan_get_metadata+0x11d/0x180 [ 489.068715][T15139] ? selinux_vm_enough_memory+0x1a0/0x1a0 [ 489.074436][T15139] security_netlink_send+0xef/0x1e0 [ 489.079655][T15139] netlink_sendmsg+0x1008/0x14d0 [ 489.084645][T15139] ? netlink_getsockopt+0x1440/0x1440 [ 489.090019][T15139] kernel_sendmsg+0x433/0x440 [ 489.094712][T15139] sock_no_sendpage+0x235/0x300 [ 489.099591][T15139] ? sock_no_mmap+0x30/0x30 [ 489.104104][T15139] sock_sendpage+0x1e1/0x2c0 [ 489.108718][T15139] pipe_to_sendpage+0x38c/0x4c0 [ 489.113587][T15139] ? sock_fasync+0x250/0x250 [ 489.118219][T15139] __splice_from_pipe+0x565/0xf00 [ 489.123248][T15139] ? generic_splice_sendpage+0x2d0/0x2d0 [ 489.128954][T15139] generic_splice_sendpage+0x1d5/0x2d0 [ 489.134433][T15139] ? iter_file_splice_write+0x1800/0x1800 [ 489.140177][T15139] direct_splice_actor+0x1fd/0x580 [ 489.145305][T15139] ? kmsan_get_metadata+0x4f/0x180 [ 489.150430][T15139] splice_direct_to_actor+0x6b2/0xf50 [ 489.155806][T15139] ? do_splice_direct+0x580/0x580 [ 489.160865][T15139] do_splice_direct+0x342/0x580 [ 489.165746][T15139] do_sendfile+0x101b/0x1d40 [ 489.170385][T15139] __se_compat_sys_sendfile+0x301/0x3c0 [ 489.175946][T15139] ? kmsan_get_metadata+0x11d/0x180 [ 489.181165][T15139] ? __ia32_sys_sendfile64+0x70/0x70 [ 489.186458][T15139] __ia32_compat_sys_sendfile+0x56/0x70 [ 489.192012][T15139] __do_fast_syscall_32+0x2aa/0x400 [ 489.197232][T15139] do_fast_syscall_32+0x6b/0xd0 [ 489.202093][T15139] do_SYSENTER_32+0x73/0x90 [ 489.206602][T15139] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 489.212928][T15139] RIP: 0023:0xf7fe2549 [ 489.216988][T15139] Code: Bad RIP value. [ 489.221052][T15139] RSP: 002b:00000000f5ddd0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 489.229482][T15139] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000000003 [ 489.237452][T15139] RDX: 0000000000000000 RSI: 00000000000000dc RDI: 0000000000000000 [ 489.245424][T15139] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 489.253399][T15139] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 489.261368][T15139] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 489.270496][T15139] Kernel Offset: 0xde00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 489.282023][T15139] Rebooting in 86400 seconds..