image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="0410000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000000)) [ 1031.752671][T32706] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:02 executing program 1: 19:14:02 executing program 1: 19:14:02 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:02 executing program 4: 19:14:02 executing program 5: 19:14:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 1031.998001][T32725] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:02 executing program 1: 19:14:02 executing program 2: 19:14:02 executing program 5: 19:14:02 executing program 4: 19:14:02 executing program 1: 19:14:02 executing program 5: 19:14:02 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) [ 1032.141069][T32734] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:03 executing program 2: 19:14:03 executing program 4: 19:14:03 executing program 5: 19:14:03 executing program 1: 19:14:03 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:03 executing program 2: 19:14:03 executing program 5: [ 1032.289499][T32748] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:03 executing program 1: 19:14:03 executing program 4: 19:14:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:03 executing program 2: 19:14:03 executing program 5: 19:14:03 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:03 executing program 4: [ 1032.457652][T32760] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:03 executing program 1: 19:14:03 executing program 5: 19:14:03 executing program 2: 19:14:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:03 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:03 executing program 4: 19:14:03 executing program 1: 19:14:03 executing program 5: 19:14:03 executing program 2: [ 1032.641915][ T310] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:03 executing program 4: 19:14:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:03 executing program 1: 19:14:03 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:03 executing program 5: 19:14:03 executing program 2: 19:14:03 executing program 4: 19:14:03 executing program 1: 19:14:03 executing program 5: [ 1032.805533][ T325] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:03 executing program 2: 19:14:03 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:03 executing program 5: 19:14:03 executing program 4: 19:14:03 executing program 1: 19:14:03 executing program 2: 19:14:03 executing program 5: [ 1032.975844][ T343] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:03 executing program 4: 19:14:03 executing program 1: 19:14:03 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:03 executing program 2: 19:14:03 executing program 5: 19:14:03 executing program 2: [ 1033.111966][ T356] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:03 executing program 4: 19:14:04 executing program 1: 19:14:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:04 executing program 5: 19:14:04 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:04 executing program 2: 19:14:04 executing program 4: 19:14:04 executing program 2: 19:14:04 executing program 1: 19:14:04 executing program 5: 19:14:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:04 executing program 2: 19:14:04 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 19:14:04 executing program 5: 19:14:04 executing program 4: 19:14:04 executing program 1: 19:14:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:04 executing program 5: 19:14:04 executing program 2: 19:14:04 executing program 1: 19:14:04 executing program 4: 19:14:04 executing program 5: 19:14:04 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 19:14:04 executing program 2: 19:14:04 executing program 1: 19:14:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:04 executing program 4: 19:14:04 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 19:14:04 executing program 1: 19:14:04 executing program 5: 19:14:04 executing program 2: 19:14:04 executing program 4: 19:14:04 executing program 5: 19:14:04 executing program 1: 19:14:04 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x0, 0x0}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:04 executing program 2: 19:14:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:04 executing program 1: 19:14:04 executing program 4: 19:14:04 executing program 5: 19:14:04 executing program 2: 19:14:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:04 executing program 5: 19:14:04 executing program 1: 19:14:04 executing program 4: 19:14:04 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x0, 0x0}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:04 executing program 2: 19:14:04 executing program 5: 19:14:04 executing program 1: 19:14:04 executing program 4: 19:14:04 executing program 2: 19:14:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:04 executing program 5: 19:14:04 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x0, 0x0}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:04 executing program 1: 19:14:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:04 executing program 4: 19:14:05 executing program 2: 19:14:05 executing program 1: 19:14:05 executing program 4: 19:14:05 executing program 2: 19:14:05 executing program 1: 19:14:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:05 executing program 5: 19:14:05 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:05 executing program 4: 19:14:05 executing program 1: 19:14:05 executing program 5: 19:14:05 executing program 2: 19:14:05 executing program 4: 19:14:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:05 executing program 5: 19:14:05 executing program 1: 19:14:05 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:05 executing program 2: 19:14:05 executing program 4: 19:14:05 executing program 1: 19:14:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:05 executing program 5: 19:14:05 executing program 2: 19:14:05 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:05 executing program 4: 19:14:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:05 executing program 1: 19:14:05 executing program 5: 19:14:05 executing program 5: 19:14:05 executing program 2: 19:14:05 executing program 4: 19:14:05 executing program 1: 19:14:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:05 executing program 2: 19:14:05 executing program 1: 19:14:05 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:05 executing program 4: 19:14:05 executing program 5: 19:14:05 executing program 2: 19:14:05 executing program 4: 19:14:05 executing program 1: 19:14:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:05 executing program 5: 19:14:05 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:05 executing program 1: 19:14:05 executing program 4: 19:14:05 executing program 2: 19:14:05 executing program 5: 19:14:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:05 executing program 1: 19:14:05 executing program 2: 19:14:05 executing program 4: 19:14:05 executing program 5: 19:14:05 executing program 1: 19:14:05 executing program 2: 19:14:06 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:06 executing program 4: 19:14:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:06 executing program 1: 19:14:06 executing program 5: 19:14:06 executing program 2: 19:14:06 executing program 4: 19:14:06 executing program 5: 19:14:06 executing program 2: 19:14:06 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:06 executing program 1: 19:14:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:06 executing program 4: 19:14:06 executing program 5: 19:14:06 executing program 2: 19:14:06 executing program 1: 19:14:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:06 executing program 4: 19:14:06 executing program 5: 19:14:06 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:06 executing program 1: 19:14:06 executing program 2: 19:14:06 executing program 4: 19:14:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:06 executing program 5: 19:14:06 executing program 1: 19:14:06 executing program 2: 19:14:06 executing program 4: 19:14:06 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) sendfile(r0, r1, 0x0, 0x102002700) 19:14:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:06 executing program 4: 19:14:06 executing program 5: 19:14:06 executing program 1: 19:14:06 executing program 2: 19:14:06 executing program 4: 19:14:06 executing program 1: 19:14:06 executing program 5: 19:14:06 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x102002700) 19:14:06 executing program 2: 19:14:06 executing program 4: 19:14:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:06 executing program 5: 19:14:06 executing program 1: 19:14:06 executing program 2: 19:14:06 executing program 4: 19:14:06 executing program 5: 19:14:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:06 executing program 2: 19:14:06 executing program 1: 19:14:06 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x102002700) 19:14:06 executing program 4: 19:14:06 executing program 5: 19:14:06 executing program 5: 19:14:07 executing program 2: 19:14:07 executing program 4: 19:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:07 executing program 1: 19:14:07 executing program 2: 19:14:07 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x102002700) 19:14:07 executing program 5: 19:14:07 executing program 4: 19:14:07 executing program 1: 19:14:07 executing program 2: 19:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:07 executing program 4: 19:14:07 executing program 2: 19:14:07 executing program 5: 19:14:07 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102002700) 19:14:07 executing program 1: 19:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:07 executing program 4: 19:14:07 executing program 2: 19:14:07 executing program 5: 19:14:07 executing program 1: 19:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:07 executing program 5: 19:14:07 executing program 1: 19:14:07 executing program 4: 19:14:07 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102002700) 19:14:07 executing program 2: 19:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:07 executing program 1: 19:14:07 executing program 2: 19:14:07 executing program 4: 19:14:07 executing program 5: 19:14:07 executing program 1: 19:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:07 executing program 5: 19:14:07 executing program 2: 19:14:07 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102002700) 19:14:07 executing program 1: 19:14:07 executing program 4: 19:14:07 executing program 5: 19:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:07 executing program 2: 19:14:07 executing program 1: 19:14:07 executing program 5: 19:14:07 executing program 4: [ 1036.952696][ T778] __nla_validate_parse: 22 callbacks suppressed [ 1036.952704][ T778] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:07 executing program 2: 19:14:07 executing program 1: 19:14:07 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x0) 19:14:07 executing program 5: 19:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:07 executing program 4: 19:14:07 executing program 2: 19:14:07 executing program 1: 19:14:07 executing program 5: 19:14:07 executing program 2: [ 1037.144340][ T797] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:08 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x0) 19:14:08 executing program 4: 19:14:08 executing program 1: 19:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:08 executing program 4: 19:14:08 executing program 5: 19:14:08 executing program 2: 19:14:08 executing program 1: 19:14:08 executing program 4: 19:14:08 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/236) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f}]}) sendfile(r0, r1, 0x0, 0x0) 19:14:08 executing program 5: [ 1037.363369][ T816] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:08 executing program 2: 19:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:08 executing program 4: 19:14:08 executing program 1: 19:14:08 executing program 5: 19:14:08 executing program 2: 19:14:08 executing program 3: [ 1037.506840][ T832] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:08 executing program 1: 19:14:08 executing program 3: 19:14:08 executing program 4: 19:14:08 executing program 2: 19:14:08 executing program 1: 19:14:08 executing program 5: [ 1037.643059][ T841] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:08 executing program 3: 19:14:08 executing program 4: 19:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:08 executing program 2: 19:14:08 executing program 1: 19:14:08 executing program 5: 19:14:08 executing program 4: 19:14:08 executing program 3: [ 1037.778212][ T849] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:08 executing program 2: 19:14:08 executing program 1: 19:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:08 executing program 5: 19:14:08 executing program 4: 19:14:08 executing program 3: 19:14:08 executing program 2: 19:14:08 executing program 1: [ 1037.912776][ T859] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:08 executing program 5: 19:14:08 executing program 3: 19:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:08 executing program 4: 19:14:08 executing program 2: 19:14:08 executing program 1: [ 1038.058736][ T870] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:08 executing program 5: 19:14:08 executing program 2: 19:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:08 executing program 3: 19:14:08 executing program 4: 19:14:08 executing program 1: 19:14:09 executing program 3: 19:14:09 executing program 4: [ 1038.210826][ T879] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:09 executing program 5: 19:14:09 executing program 2: 19:14:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:09 executing program 3: 19:14:09 executing program 1: 19:14:09 executing program 4: 19:14:09 executing program 5: 19:14:09 executing program 2: 19:14:09 executing program 3: 19:14:09 executing program 1: [ 1038.377490][ T889] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:09 executing program 4: 19:14:09 executing program 5: 19:14:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:09 executing program 2: 19:14:09 executing program 1: 19:14:09 executing program 3: 19:14:09 executing program 4: 19:14:09 executing program 5: 19:14:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:09 executing program 2: 19:14:09 executing program 3: 19:14:09 executing program 1: 19:14:09 executing program 4: 19:14:09 executing program 5: 19:14:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:09 executing program 2: 19:14:09 executing program 1: 19:14:09 executing program 3: 19:14:09 executing program 4: 19:14:09 executing program 5: 19:14:09 executing program 2: 19:14:09 executing program 1: 19:14:09 executing program 3: 19:14:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:09 executing program 5: 19:14:09 executing program 4: 19:14:09 executing program 2: 19:14:09 executing program 1: 19:14:09 executing program 4: 19:14:09 executing program 2: 19:14:09 executing program 3: 19:14:09 executing program 5: 19:14:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:09 executing program 1: 19:14:09 executing program 4: 19:14:09 executing program 5: 19:14:09 executing program 2: 19:14:09 executing program 3: 19:14:09 executing program 1: 19:14:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:09 executing program 4: 19:14:09 executing program 3: 19:14:09 executing program 5: 19:14:10 executing program 2: 19:14:10 executing program 1: 19:14:10 executing program 4: 19:14:10 executing program 3: 19:14:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:10 executing program 5: 19:14:10 executing program 2: 19:14:10 executing program 1: 19:14:10 executing program 5: 19:14:10 executing program 3: 19:14:10 executing program 2: 19:14:10 executing program 4: 19:14:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:10 executing program 3: 19:14:10 executing program 1: 19:14:10 executing program 5: 19:14:10 executing program 2: 19:14:10 executing program 4: 19:14:10 executing program 1: 19:14:10 executing program 2: 19:14:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:10 executing program 1: 19:14:10 executing program 4: 19:14:10 executing program 5: 19:14:10 executing program 3: 19:14:10 executing program 2: 19:14:10 executing program 1: 19:14:10 executing program 4: 19:14:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:10 executing program 2: 19:14:10 executing program 3: 19:14:10 executing program 5: 19:14:10 executing program 1: 19:14:10 executing program 2: 19:14:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:10 executing program 5: 19:14:10 executing program 3: 19:14:10 executing program 4: 19:14:10 executing program 1: 19:14:10 executing program 5: 19:14:10 executing program 4: 19:14:10 executing program 3: 19:14:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:10 executing program 2: 19:14:10 executing program 1: 19:14:10 executing program 2: 19:14:10 executing program 3: 19:14:10 executing program 5: 19:14:10 executing program 4: 19:14:10 executing program 1: 19:14:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:10 executing program 2: 19:14:11 executing program 3: 19:14:11 executing program 4: 19:14:11 executing program 5: 19:14:11 executing program 2: 19:14:11 executing program 1: 19:14:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:11 executing program 3: 19:14:11 executing program 4: 19:14:11 executing program 5: 19:14:11 executing program 2: 19:14:11 executing program 1: 19:14:11 executing program 2: 19:14:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:11 executing program 4: 19:14:11 executing program 1: 19:14:11 executing program 5: 19:14:11 executing program 3: 19:14:11 executing program 2: 19:14:11 executing program 4: 19:14:11 executing program 1: 19:14:11 executing program 5: 19:14:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:11 executing program 2: 19:14:11 executing program 3: 19:14:11 executing program 4: 19:14:11 executing program 1: 19:14:11 executing program 2: 19:14:11 executing program 5: 19:14:11 executing program 1: 19:14:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:11 executing program 2: 19:14:11 executing program 3: 19:14:11 executing program 5: 19:14:11 executing program 4: 19:14:11 executing program 1: 19:14:11 executing program 5: 19:14:11 executing program 2: 19:14:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:11 executing program 4: 19:14:11 executing program 3: 19:14:11 executing program 1: 19:14:11 executing program 5: 19:14:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:11 executing program 2: 19:14:11 executing program 4: 19:14:11 executing program 3: 19:14:11 executing program 1: 19:14:11 executing program 5: 19:14:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:11 executing program 3: 19:14:11 executing program 4: 19:14:11 executing program 2: 19:14:11 executing program 4: 19:14:12 executing program 1: 19:14:12 executing program 5: 19:14:12 executing program 2: 19:14:12 executing program 3: 19:14:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000009000100"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:12 executing program 4: 19:14:12 executing program 5: 19:14:12 executing program 1: 19:14:12 executing program 2: 19:14:12 executing program 3: 19:14:12 executing program 4: 19:14:12 executing program 5: 19:14:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000009000100"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:12 executing program 1: 19:14:12 executing program 3: 19:14:12 executing program 2: 19:14:12 executing program 4: 19:14:12 executing program 3: 19:14:12 executing program 1: 19:14:12 executing program 5: 19:14:12 executing program 2: 19:14:12 executing program 4: 19:14:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000009000100"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:12 executing program 5: 19:14:12 executing program 3: 19:14:12 executing program 1: 19:14:12 executing program 2: 19:14:12 executing program 4: 19:14:12 executing program 5: 19:14:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:12 executing program 3: 19:14:12 executing program 1: 19:14:12 executing program 2: 19:14:12 executing program 5: 19:14:12 executing program 4: 19:14:12 executing program 3: 19:14:12 executing program 2: 19:14:12 executing program 1: 19:14:12 executing program 5: 19:14:12 executing program 3: 19:14:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:12 executing program 4: 19:14:12 executing program 2: 19:14:12 executing program 5: 19:14:12 executing program 1: [ 1042.003612][ T1223] __nla_validate_parse: 34 callbacks suppressed [ 1042.003621][ T1223] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:12 executing program 2: 19:14:12 executing program 3: 19:14:12 executing program 5: 19:14:12 executing program 4: 19:14:12 executing program 1: 19:14:12 executing program 5: 19:14:12 executing program 4: [ 1042.133444][ T1228] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:12 executing program 3: 19:14:12 executing program 2: 19:14:13 executing program 1: 19:14:13 executing program 5: 19:14:13 executing program 3: [ 1042.243611][ T1246] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:13 executing program 4: 19:14:13 executing program 2: 19:14:13 executing program 1: 19:14:13 executing program 5: [ 1042.329034][ T1249] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:13 executing program 4: 19:14:13 executing program 3: 19:14:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:13 executing program 2: 19:14:13 executing program 1: 19:14:13 executing program 5: 19:14:13 executing program 4: 19:14:13 executing program 3: 19:14:13 executing program 2: [ 1042.469721][ T1264] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:13 executing program 1: 19:14:13 executing program 5: 19:14:13 executing program 4: 19:14:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:13 executing program 3: 19:14:13 executing program 2: 19:14:13 executing program 1: 19:14:13 executing program 4: 19:14:13 executing program 3: 19:14:13 executing program 5: 19:14:13 executing program 2: 19:14:13 executing program 1: [ 1042.699058][ T1283] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:13 executing program 3: 19:14:13 executing program 5: 19:14:13 executing program 4: [ 1042.811955][ T1288] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:13 executing program 2: 19:14:13 executing program 1: 19:14:13 executing program 3: 19:14:13 executing program 5: 19:14:13 executing program 4: 19:14:13 executing program 2: 19:14:13 executing program 1: 19:14:13 executing program 3: [ 1042.933586][ T1304] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:13 executing program 5: 19:14:13 executing program 4: [ 1042.993623][ T1309] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:13 executing program 1: 19:14:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:13 executing program 5: 19:14:13 executing program 2: 19:14:13 executing program 3: 19:14:13 executing program 4: 19:14:13 executing program 1: [ 1043.124936][ T1321] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:13 executing program 5: 19:14:13 executing program 2: 19:14:13 executing program 3: 19:14:14 executing program 4: 19:14:14 executing program 1: 19:14:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:14 executing program 5: 19:14:14 executing program 2: 19:14:14 executing program 3: 19:14:14 executing program 4: 19:14:14 executing program 1: 19:14:14 executing program 2: 19:14:14 executing program 5: 19:14:14 executing program 4: 19:14:14 executing program 3: 19:14:14 executing program 5: 19:14:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:14 executing program 2: 19:14:14 executing program 1: 19:14:14 executing program 3: 19:14:14 executing program 4: 19:14:14 executing program 5: 19:14:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:14 executing program 2: 19:14:14 executing program 1: 19:14:14 executing program 4: 19:14:14 executing program 5: 19:14:14 executing program 3: 19:14:14 executing program 5: 19:14:14 executing program 2: 19:14:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:14 executing program 1: 19:14:14 executing program 4: 19:14:14 executing program 3: 19:14:14 executing program 2: 19:14:14 executing program 1: 19:14:14 executing program 4: 19:14:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:14 executing program 5: 19:14:14 executing program 3: 19:14:14 executing program 1: 19:14:14 executing program 2: 19:14:14 executing program 4: 19:14:14 executing program 5: 19:14:14 executing program 1: 19:14:14 executing program 3: 19:14:14 executing program 2: 19:14:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:14 executing program 4: 19:14:14 executing program 5: 19:14:14 executing program 1: 19:14:14 executing program 3: 19:14:14 executing program 2: 19:14:14 executing program 1: 19:14:14 executing program 4: 19:14:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:14 executing program 3: 19:14:14 executing program 5: 19:14:15 executing program 2: 19:14:15 executing program 1: 19:14:15 executing program 4: 19:14:15 executing program 3: 19:14:15 executing program 5: 19:14:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:15 executing program 2: 19:14:15 executing program 1: 19:14:15 executing program 3: 19:14:15 executing program 4: 19:14:15 executing program 5: 19:14:15 executing program 1: 19:14:15 executing program 2: 19:14:15 executing program 3: 19:14:15 executing program 4: 19:14:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:15 executing program 5: 19:14:15 executing program 1: 19:14:15 executing program 2: 19:14:15 executing program 3: 19:14:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:15 executing program 4: 19:14:15 executing program 1: 19:14:15 executing program 5: 19:14:15 executing program 2: 19:14:15 executing program 3: 19:14:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:15 executing program 1: 19:14:15 executing program 4: 19:14:15 executing program 5: 19:14:15 executing program 3: 19:14:15 executing program 2: 19:14:15 executing program 1: 19:14:15 executing program 3: 19:14:15 executing program 4: 19:14:15 executing program 2: 19:14:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:15 executing program 5: 19:14:15 executing program 1: 19:14:15 executing program 3: 19:14:15 executing program 5: 19:14:15 executing program 1: 19:14:15 executing program 2: 19:14:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:15 executing program 4: 19:14:15 executing program 3: 19:14:15 executing program 1: 19:14:15 executing program 5: 19:14:15 executing program 2: 19:14:15 executing program 4: 19:14:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:15 executing program 3: 19:14:16 executing program 1: 19:14:16 executing program 4: 19:14:16 executing program 2: 19:14:16 executing program 5: 19:14:16 executing program 3: 19:14:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:16 executing program 4: 19:14:16 executing program 1: 19:14:16 executing program 5: 19:14:16 executing program 3: 19:14:16 executing program 2: 19:14:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:16 executing program 4: 19:14:16 executing program 1: 19:14:16 executing program 2: 19:14:16 executing program 5: 19:14:16 executing program 3: 19:14:16 executing program 4: 19:14:16 executing program 1: 19:14:16 executing program 2: 19:14:16 executing program 5: 19:14:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:16 executing program 3: 19:14:16 executing program 4: 19:14:16 executing program 1: 19:14:16 executing program 2: 19:14:16 executing program 5: 19:14:16 executing program 3: 19:14:16 executing program 4: 19:14:16 executing program 2: 19:14:16 executing program 1: 19:14:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:16 executing program 3: 19:14:16 executing program 5: 19:14:16 executing program 2: 19:14:16 executing program 4: 19:14:16 executing program 1: 19:14:16 executing program 5: 19:14:16 executing program 3: 19:14:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:16 executing program 2: 19:14:16 executing program 4: 19:14:16 executing program 1: 19:14:16 executing program 5: 19:14:16 executing program 2: 19:14:16 executing program 3: 19:14:16 executing program 4: 19:14:16 executing program 5: 19:14:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:16 executing program 1: 19:14:16 executing program 2: 19:14:16 executing program 4: 19:14:16 executing program 3: 19:14:16 executing program 5: 19:14:17 executing program 1: 19:14:17 executing program 2: 19:14:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:17 executing program 4: 19:14:17 executing program 5: 19:14:17 executing program 1: 19:14:17 executing program 2: 19:14:17 executing program 3: 19:14:17 executing program 5: 19:14:17 executing program 4: 19:14:17 executing program 1: 19:14:17 executing program 2: 19:14:17 executing program 3: 19:14:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:17 executing program 4: 19:14:17 executing program 3: 19:14:17 executing program 1: 19:14:17 executing program 2: 19:14:17 executing program 5: 19:14:17 executing program 4: 19:14:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a3", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:17 executing program 1: 19:14:17 executing program 5: 19:14:17 executing program 3: 19:14:17 executing program 2: 19:14:17 executing program 4: 19:14:17 executing program 1: 19:14:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a3", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:17 executing program 5: 19:14:17 executing program 3: 19:14:17 executing program 1: 19:14:17 executing program 2: 19:14:17 executing program 4: 19:14:17 executing program 5: 19:14:17 executing program 3: 19:14:17 executing program 1: 19:14:17 executing program 2: 19:14:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a3", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:17 executing program 4: 19:14:17 executing program 5: 19:14:17 executing program 1: 19:14:17 executing program 3: 19:14:17 executing program 2: 19:14:17 executing program 4: 19:14:17 executing program 5: 19:14:17 executing program 3: 19:14:17 executing program 2: 19:14:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a3000500", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:17 executing program 1: 19:14:17 executing program 5: 19:14:17 executing program 4: 19:14:17 executing program 3: 19:14:17 executing program 2: [ 1047.107321][ T1697] __nla_validate_parse: 35 callbacks suppressed [ 1047.107330][ T1697] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:17 executing program 1: 19:14:18 executing program 5: 19:14:18 executing program 4: 19:14:18 executing program 3: [ 1047.209401][ T1701] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:18 executing program 2: 19:14:18 executing program 1: 19:14:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a3000500", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:18 executing program 5: 19:14:18 executing program 4: 19:14:18 executing program 3: 19:14:18 executing program 2: 19:14:18 executing program 4: 19:14:18 executing program 1: [ 1047.378785][ T1719] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:18 executing program 3: 19:14:18 executing program 5: 19:14:18 executing program 2: 19:14:18 executing program 1: 19:14:18 executing program 4: [ 1047.491112][ T1725] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a3000500", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:18 executing program 3: 19:14:18 executing program 5: 19:14:18 executing program 2: 19:14:18 executing program 1: 19:14:18 executing program 4: 19:14:18 executing program 3: [ 1047.616374][ T1740] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:18 executing program 4: 19:14:18 executing program 2: 19:14:18 executing program 5: 19:14:18 executing program 1: 19:14:18 executing program 3: [ 1047.708891][ T1744] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:18 executing program 5: 19:14:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a300050000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:18 executing program 4: 19:14:18 executing program 2: 19:14:18 executing program 1: 19:14:18 executing program 3: 19:14:18 executing program 4: 19:14:18 executing program 5: 19:14:18 executing program 2: 19:14:18 executing program 1: [ 1047.866791][ T1763] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:18 executing program 3: 19:14:18 executing program 4: 19:14:18 executing program 5: [ 1047.978367][ T1766] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a300050000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:18 executing program 2: 19:14:18 executing program 4: 19:14:18 executing program 3: 19:14:18 executing program 5: 19:14:18 executing program 1: 19:14:18 executing program 3: 19:14:18 executing program 2: 19:14:18 executing program 5: 19:14:18 executing program 4: 19:14:18 executing program 1: 19:14:19 executing program 2: [ 1048.162276][ T1784] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a300050000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:19 executing program 4: 19:14:19 executing program 1: 19:14:19 executing program 3: 19:14:19 executing program 5: [ 1048.248530][ T1790] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:19 executing program 2: 19:14:19 executing program 3: 19:14:19 executing program 4: 19:14:19 executing program 2: 19:14:19 executing program 1: 19:14:19 executing program 5: 19:14:19 executing program 1: 19:14:19 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:19 executing program 2: 19:14:19 executing program 5: 19:14:19 executing program 4: 19:14:19 executing program 3: 19:14:19 executing program 1: 19:14:19 executing program 3: 19:14:19 executing program 4: 19:14:19 executing program 2: 19:14:19 executing program 5: 19:14:19 executing program 1: 19:14:19 executing program 5: 19:14:19 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:19 executing program 2: 19:14:19 executing program 4: 19:14:19 executing program 3: 19:14:19 executing program 2: 19:14:19 executing program 5: 19:14:19 executing program 3: 19:14:19 executing program 1: 19:14:19 executing program 4: 19:14:19 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:19 executing program 1: 19:14:19 executing program 5: 19:14:19 executing program 4: 19:14:19 executing program 2: 19:14:19 executing program 3: 19:14:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 19:14:19 executing program 5: 19:14:19 executing program 1: 19:14:19 executing program 4: 19:14:19 executing program 3: 19:14:19 executing program 2: 19:14:19 executing program 5: 19:14:19 executing program 1: 19:14:19 executing program 4: 19:14:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 19:14:19 executing program 5: 19:14:19 executing program 3: 19:14:19 executing program 2: 19:14:20 executing program 4: 19:14:20 executing program 1: 19:14:20 executing program 3: 19:14:20 executing program 5: 19:14:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 19:14:20 executing program 2: 19:14:20 executing program 4: 19:14:20 executing program 1: 19:14:20 executing program 3: 19:14:20 executing program 5: 19:14:20 executing program 2: 19:14:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 19:14:20 executing program 1: 19:14:20 executing program 3: 19:14:20 executing program 4: 19:14:20 executing program 5: 19:14:20 executing program 2: 19:14:20 executing program 1: 19:14:20 executing program 3: 19:14:20 executing program 4: 19:14:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 19:14:20 executing program 5: 19:14:20 executing program 2: 19:14:20 executing program 5: 19:14:20 executing program 3: 19:14:20 executing program 1: 19:14:20 executing program 4: 19:14:20 executing program 2: 19:14:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 19:14:20 executing program 5: 19:14:20 executing program 2: 19:14:20 executing program 4: 19:14:20 executing program 1: 19:14:20 executing program 3: 19:14:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 19:14:20 executing program 2: 19:14:20 executing program 4: 19:14:20 executing program 5: 19:14:20 executing program 1: 19:14:20 executing program 3: 19:14:20 executing program 4: 19:14:20 executing program 2: 19:14:20 executing program 5: 19:14:20 executing program 3: 19:14:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 19:14:20 executing program 1: 19:14:20 executing program 4: 19:14:20 executing program 1: 19:14:20 executing program 3: 19:14:20 executing program 2: 19:14:20 executing program 5: 19:14:21 executing program 4: 19:14:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 19:14:21 executing program 2: 19:14:21 executing program 3: 19:14:21 executing program 1: 19:14:21 executing program 5: 19:14:21 executing program 4: 19:14:21 executing program 2: 19:14:21 executing program 1: 19:14:21 executing program 3: 19:14:21 executing program 5: 19:14:21 executing program 2: 19:14:21 executing program 4: 19:14:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:21 executing program 3: 19:14:21 executing program 1: 19:14:21 executing program 2: 19:14:21 executing program 5: 19:14:21 executing program 4: 19:14:21 executing program 3: 19:14:21 executing program 1: 19:14:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:21 executing program 2: 19:14:21 executing program 4: 19:14:21 executing program 3: 19:14:21 executing program 5: 19:14:21 executing program 1: 19:14:21 executing program 3: 19:14:21 executing program 2: 19:14:21 executing program 4: 19:14:21 executing program 5: 19:14:21 executing program 1: 19:14:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:21 executing program 5: 19:14:21 executing program 3: 19:14:21 executing program 2: 19:14:21 executing program 4: 19:14:21 executing program 1: 19:14:21 executing program 3: 19:14:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:21 executing program 4: 19:14:21 executing program 2: 19:14:21 executing program 5: 19:14:21 executing program 1: 19:14:21 executing program 4: 19:14:21 executing program 3: 19:14:21 executing program 2: 19:14:21 executing program 5: 19:14:21 executing program 1: 19:14:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:21 executing program 2: 19:14:21 executing program 4: 19:14:21 executing program 5: 19:14:21 executing program 3: 19:14:22 executing program 1: 19:14:22 executing program 5: 19:14:22 executing program 4: 19:14:22 executing program 2: 19:14:22 executing program 3: 19:14:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x1300}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:22 executing program 4: 19:14:22 executing program 5: 19:14:22 executing program 1: 19:14:22 executing program 2: 19:14:22 executing program 4: 19:14:22 executing program 3: 19:14:22 executing program 5: 19:14:22 executing program 1: 19:14:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:22 executing program 3: 19:14:22 executing program 2: 19:14:22 executing program 5: 19:14:22 executing program 3: 19:14:22 executing program 4: 19:14:22 executing program 1: 19:14:22 executing program 2: 19:14:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:22 executing program 5: 19:14:22 executing program 1: 19:14:22 executing program 3: 19:14:22 executing program 4: 19:14:22 executing program 2: 19:14:22 executing program 5: 19:14:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:22 executing program 1: 19:14:22 executing program 3: 19:14:22 executing program 4: 19:14:22 executing program 2: 19:14:22 executing program 1: 19:14:22 executing program 4: 19:14:22 executing program 5: 19:14:22 executing program 2: 19:14:22 executing program 3: 19:14:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:22 executing program 1: 19:14:22 executing program 5: 19:14:22 executing program 4: 19:14:22 executing program 2: 19:14:22 executing program 3: 19:14:22 executing program 5: 19:14:22 executing program 1: 19:14:22 executing program 4: 19:14:22 executing program 2: 19:14:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:22 executing program 3: 19:14:22 executing program 5: 19:14:22 executing program 1: 19:14:22 executing program 4: 19:14:22 executing program 2: [ 1052.165547][ T2162] __nla_validate_parse: 24 callbacks suppressed [ 1052.165563][ T2162] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:23 executing program 3: 19:14:23 executing program 2: 19:14:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) 19:14:23 executing program 1: 19:14:23 executing program 5: 19:14:23 executing program 3: 19:14:23 executing program 4: 19:14:23 executing program 2: [ 1052.328047][ T2179] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:23 executing program 5: 19:14:23 executing program 1: 19:14:23 executing program 3: 19:14:23 executing program 2: 19:14:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}}, 0x24}}, 0x0) 19:14:23 executing program 4: 19:14:23 executing program 5: 19:14:23 executing program 5: 19:14:23 executing program 3: 19:14:23 executing program 1: 19:14:23 executing program 2: 19:14:23 executing program 4: [ 1052.535789][ T2197] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:23 executing program 5: 19:14:23 executing program 3: 19:14:23 executing program 2: 19:14:23 executing program 1: 19:14:23 executing program 4: 19:14:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}}, 0x24}}, 0x0) 19:14:23 executing program 5: 19:14:23 executing program 3: 19:14:23 executing program 2: 19:14:23 executing program 4: 19:14:23 executing program 1: 19:14:23 executing program 5: [ 1052.740988][ T2218] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:23 executing program 3: 19:14:23 executing program 2: 19:14:23 executing program 4: 19:14:23 executing program 1: 19:14:23 executing program 3: 19:14:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1300}, {}, {0x8}}}, 0x24}}, 0x0) 19:14:23 executing program 5: 19:14:23 executing program 3: 19:14:23 executing program 2: 19:14:23 executing program 4: 19:14:23 executing program 1: [ 1052.946291][ T2236] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 19:14:23 executing program 2: 19:14:23 executing program 5: 19:14:23 executing program 3: 19:14:23 executing program 0: 19:14:23 executing program 4: 19:14:23 executing program 1: 19:14:23 executing program 3: 19:14:23 executing program 2: 19:14:23 executing program 5: 19:14:23 executing program 1: 19:14:24 executing program 4: 19:14:24 executing program 0: 19:14:24 executing program 5: 19:14:24 executing program 3: 19:14:24 executing program 2: 19:14:24 executing program 1: 19:14:24 executing program 5: 19:14:24 executing program 3: 19:14:24 executing program 2: 19:14:24 executing program 0: 19:14:24 executing program 1: 19:14:24 executing program 4: 19:14:24 executing program 5: 19:14:24 executing program 3: 19:14:24 executing program 0: 19:14:24 executing program 2: 19:14:24 executing program 1: 19:14:24 executing program 4: 19:14:24 executing program 5: 19:14:24 executing program 3: 19:14:24 executing program 4: 19:14:24 executing program 2: 19:14:24 executing program 0: 19:14:24 executing program 1: 19:14:24 executing program 5: 19:14:24 executing program 3: 19:14:24 executing program 4: 19:14:24 executing program 2: 19:14:24 executing program 0: 19:14:24 executing program 1: 19:14:24 executing program 5: 19:14:24 executing program 3: 19:14:24 executing program 4: 19:14:24 executing program 2: 19:14:24 executing program 1: 19:14:24 executing program 0: 19:14:24 executing program 5: 19:14:24 executing program 2: 19:14:24 executing program 3: 19:14:24 executing program 4: 19:14:24 executing program 1: 19:14:24 executing program 0: 19:14:24 executing program 5: 19:14:24 executing program 2: 19:14:24 executing program 3: 19:14:24 executing program 1: 19:14:24 executing program 4: 19:14:24 executing program 0: 19:14:24 executing program 4: 19:14:24 executing program 5: 19:14:24 executing program 3: 19:14:24 executing program 2: 19:14:24 executing program 1: 19:14:24 executing program 0: 19:14:24 executing program 3: 19:14:24 executing program 5: 19:14:24 executing program 1: 19:14:24 executing program 4: 19:14:24 executing program 2: 19:14:25 executing program 3: 19:14:25 executing program 0: 19:14:25 executing program 5: 19:14:25 executing program 1: 19:14:25 executing program 2: 19:14:25 executing program 4: 19:14:25 executing program 0: 19:14:25 executing program 3: 19:14:25 executing program 1: 19:14:25 executing program 5: 19:14:25 executing program 2: 19:14:25 executing program 4: 19:14:25 executing program 0: 19:14:25 executing program 3: 19:14:25 executing program 5: 19:14:25 executing program 1: 19:14:25 executing program 2: 19:14:25 executing program 4: 19:14:25 executing program 0: 19:14:25 executing program 3: 19:14:25 executing program 5: 19:14:25 executing program 1: 19:14:25 executing program 2: 19:14:25 executing program 4: 19:14:25 executing program 0: 19:14:25 executing program 3: 19:14:25 executing program 1: 19:14:25 executing program 5: 19:14:25 executing program 2: 19:14:25 executing program 4: 19:14:25 executing program 0: 19:14:25 executing program 3: 19:14:25 executing program 1: 19:14:25 executing program 2: 19:14:25 executing program 5: 19:14:25 executing program 4: 19:14:25 executing program 0: 19:14:25 executing program 3: 19:14:25 executing program 1: 19:14:25 executing program 2: 19:14:25 executing program 4: 19:14:25 executing program 5: 19:14:25 executing program 0: 19:14:25 executing program 3: 19:14:25 executing program 1: 19:14:25 executing program 2: 19:14:25 executing program 4: 19:14:25 executing program 5: 19:14:25 executing program 1: 19:14:25 executing program 0: 19:14:25 executing program 2: 19:14:25 executing program 3: 19:14:25 executing program 4: 19:14:25 executing program 2: 19:14:25 executing program 5: 19:14:25 executing program 0: 19:14:25 executing program 1: 19:14:25 executing program 3: 19:14:25 executing program 2: 19:14:25 executing program 4: 19:14:26 executing program 5: 19:14:26 executing program 3: 19:14:26 executing program 1: 19:14:26 executing program 0: 19:14:26 executing program 2: 19:14:26 executing program 4: 19:14:26 executing program 0: 19:14:26 executing program 5: 19:14:26 executing program 2: 19:14:26 executing program 1: 19:14:26 executing program 3: 19:14:26 executing program 2: 19:14:26 executing program 4: 19:14:26 executing program 0: 19:14:26 executing program 5: 19:14:26 executing program 1: 19:14:26 executing program 0: 19:14:26 executing program 3: 19:14:26 executing program 2: 19:14:26 executing program 4: 19:14:26 executing program 5: 19:14:26 executing program 1: 19:14:26 executing program 3: 19:14:26 executing program 2: 19:14:26 executing program 5: 19:14:26 executing program 0: 19:14:26 executing program 1: 19:14:26 executing program 4: 19:14:26 executing program 3: 19:14:26 executing program 5: 19:14:26 executing program 2: 19:14:26 executing program 0: 19:14:26 executing program 1: 19:14:26 executing program 4: 19:14:26 executing program 3: 19:14:26 executing program 0: 19:14:26 executing program 2: 19:14:26 executing program 5: 19:14:26 executing program 1: 19:14:26 executing program 4: 19:14:26 executing program 0: 19:14:26 executing program 3: 19:14:26 executing program 2: 19:14:26 executing program 5: 19:14:26 executing program 1: 19:14:26 executing program 4: 19:14:26 executing program 0: 19:14:26 executing program 2: 19:14:26 executing program 3: 19:14:26 executing program 5: 19:14:26 executing program 4: 19:14:26 executing program 0: 19:14:26 executing program 1: 19:14:26 executing program 2: 19:14:26 executing program 5: 19:14:26 executing program 3: 19:14:26 executing program 0: 19:14:26 executing program 4: 19:14:27 executing program 1: 19:14:27 executing program 2: 19:14:27 executing program 5: 19:14:27 executing program 4: 19:14:27 executing program 3: 19:14:27 executing program 0: 19:14:27 executing program 1: 19:14:27 executing program 5: 19:14:27 executing program 4: 19:14:27 executing program 2: 19:14:27 executing program 0: 19:14:27 executing program 3: 19:14:27 executing program 5: 19:14:27 executing program 1: 19:14:27 executing program 2: 19:14:27 executing program 4: 19:14:27 executing program 3: 19:14:27 executing program 0: 19:14:27 executing program 2: 19:14:27 executing program 5: 19:14:27 executing program 1: 19:14:27 executing program 3: 19:14:27 executing program 0: 19:14:27 executing program 5: 19:14:27 executing program 4: 19:14:27 executing program 2: 19:14:27 executing program 3: 19:14:27 executing program 1: 19:14:27 executing program 0: 19:14:27 executing program 5: 19:14:27 executing program 4: 19:14:27 executing program 3: 19:14:27 executing program 1: 19:14:27 executing program 2: 19:14:27 executing program 0: 19:14:27 executing program 3: 19:14:27 executing program 5: 19:14:27 executing program 1: 19:14:27 executing program 4: 19:14:27 executing program 2: 19:14:27 executing program 3: 19:14:27 executing program 1: 19:14:27 executing program 5: 19:14:27 executing program 0: 19:14:27 executing program 4: 19:14:27 executing program 2: 19:14:27 executing program 1: 19:14:27 executing program 0: 19:14:27 executing program 5: 19:14:27 executing program 3: 19:14:27 executing program 4: 19:14:27 executing program 0: 19:14:27 executing program 1: 19:14:27 executing program 2: 19:14:27 executing program 5: 19:14:27 executing program 3: 19:14:28 executing program 4: 19:14:28 executing program 0: 19:14:28 executing program 1: 19:14:28 executing program 2: 19:14:28 executing program 5: 19:14:28 executing program 3: 19:14:28 executing program 4: 19:14:28 executing program 1: 19:14:28 executing program 0: 19:14:28 executing program 2: 19:14:28 executing program 5: 19:14:28 executing program 3: 19:14:28 executing program 4: 19:14:28 executing program 1: 19:14:28 executing program 2: 19:14:28 executing program 5: 19:14:28 executing program 0: 19:14:28 executing program 3: 19:14:28 executing program 4: 19:14:28 executing program 5: 19:14:28 executing program 1: 19:14:28 executing program 2: 19:14:28 executing program 0: 19:14:28 executing program 5: 19:14:28 executing program 3: 19:14:28 executing program 4: 19:14:28 executing program 1: 19:14:28 executing program 0: 19:14:28 executing program 2: 19:14:28 executing program 3: 19:14:28 executing program 5: 19:14:28 executing program 4: 19:14:28 executing program 1: 19:14:28 executing program 2: 19:14:28 executing program 0: 19:14:28 executing program 5: 19:14:28 executing program 3: 19:14:28 executing program 4: 19:14:28 executing program 1: 19:14:28 executing program 2: 19:14:28 executing program 0: 19:14:28 executing program 5: 19:14:28 executing program 3: 19:14:28 executing program 4: 19:14:28 executing program 1: 19:14:28 executing program 2: 19:14:28 executing program 0: 19:14:28 executing program 5: 19:14:28 executing program 3: 19:14:28 executing program 4: 19:14:28 executing program 1: 19:14:28 executing program 2: 19:14:28 executing program 0: 19:14:28 executing program 5: 19:14:28 executing program 3: 19:14:28 executing program 4: 19:14:28 executing program 1: 19:14:28 executing program 2: 19:14:28 executing program 0: 19:14:29 executing program 5: 19:14:29 executing program 3: 19:14:29 executing program 4: 19:14:29 executing program 1: 19:14:29 executing program 2: 19:14:29 executing program 0: 19:14:29 executing program 5: 19:14:29 executing program 1: 19:14:29 executing program 3: 19:14:29 executing program 4: 19:14:29 executing program 2: 19:14:29 executing program 0: 19:14:29 executing program 5: 19:14:29 executing program 1: 19:14:29 executing program 4: 19:14:29 executing program 3: 19:14:29 executing program 2: 19:14:29 executing program 0: 19:14:29 executing program 5: 19:14:29 executing program 4: 19:14:29 executing program 3: 19:14:29 executing program 1: 19:14:29 executing program 2: 19:14:29 executing program 0: 19:14:29 executing program 4: 19:14:29 executing program 1: 19:14:29 executing program 5: 19:14:29 executing program 3: 19:14:29 executing program 0: 19:14:29 executing program 2: 19:14:29 executing program 5: 19:14:29 executing program 3: 19:14:29 executing program 4: 19:14:29 executing program 1: 19:14:29 executing program 0: 19:14:29 executing program 2: 19:14:29 executing program 5: 19:14:29 executing program 0: 19:14:29 executing program 2: 19:14:29 executing program 4: 19:14:29 executing program 1: 19:14:29 executing program 3: 19:14:29 executing program 5: 19:14:29 executing program 0: 19:14:29 executing program 2: 19:14:29 executing program 4: 19:14:29 executing program 1: 19:14:29 executing program 5: 19:14:29 executing program 3: 19:14:29 executing program 0: 19:14:29 executing program 2: 19:14:29 executing program 4: 19:14:29 executing program 5: 19:14:29 executing program 1: 19:14:29 executing program 3: 19:14:29 executing program 2: 19:14:29 executing program 0: 19:14:29 executing program 4: 19:14:29 executing program 5: 19:14:29 executing program 1: 19:14:29 executing program 0: 19:14:29 executing program 3: 19:14:29 executing program 2: 19:14:30 executing program 4: 19:14:30 executing program 0: 19:14:30 executing program 2: 19:14:30 executing program 4: 19:14:30 executing program 1: 19:14:30 executing program 5: 19:14:30 executing program 2: 19:14:30 executing program 3: 19:14:30 executing program 0: 19:14:30 executing program 5: 19:14:30 executing program 4: 19:14:30 executing program 1: 19:14:30 executing program 3: 19:14:30 executing program 2: 19:14:30 executing program 0: 19:14:30 executing program 1: 19:14:30 executing program 2: 19:14:30 executing program 4: 19:14:30 executing program 5: 19:14:30 executing program 3: 19:14:30 executing program 1: 19:14:30 executing program 5: 19:14:30 executing program 0: 19:14:30 executing program 4: 19:14:30 executing program 2: 19:14:30 executing program 3: 19:14:30 executing program 1: 19:14:30 executing program 0: 19:14:30 executing program 5: 19:14:30 executing program 4: 19:14:30 executing program 2: 19:14:30 executing program 1: 19:14:30 executing program 3: 19:14:30 executing program 0: 19:14:30 executing program 5: 19:14:30 executing program 4: 19:14:30 executing program 2: 19:14:30 executing program 1: 19:14:30 executing program 3: 19:14:30 executing program 5: 19:14:30 executing program 0: 19:14:30 executing program 4: 19:14:30 executing program 2: 19:14:30 executing program 5: 19:14:30 executing program 1: 19:14:30 executing program 3: 19:14:30 executing program 4: 19:14:30 executing program 0: 19:14:30 executing program 2: 19:14:30 executing program 5: 19:14:30 executing program 3: 19:14:30 executing program 1: 19:14:30 executing program 4: 19:14:30 executing program 0: 19:14:30 executing program 2: 19:14:30 executing program 5: 19:14:30 executing program 3: 19:14:30 executing program 1: 19:14:30 executing program 4: 19:14:30 executing program 5: 19:14:30 executing program 2: 19:14:30 executing program 3: 19:14:30 executing program 0: 19:14:30 executing program 5: 19:14:31 executing program 1: 19:14:31 executing program 3: 19:14:31 executing program 2: 19:14:31 executing program 4: 19:14:31 executing program 5: 19:14:31 executing program 0: 19:14:31 executing program 1: 19:14:31 executing program 3: 19:14:31 executing program 4: 19:14:31 executing program 5: 19:14:31 executing program 2: 19:14:31 executing program 1: 19:14:31 executing program 0: 19:14:31 executing program 4: 19:14:31 executing program 3: 19:14:31 executing program 5: 19:14:31 executing program 2: 19:14:31 executing program 0: 19:14:31 executing program 4: 19:14:31 executing program 1: 19:14:31 executing program 5: 19:14:31 executing program 3: 19:14:31 executing program 2: 19:14:31 executing program 0: 19:14:31 executing program 1: 19:14:31 executing program 3: 19:14:31 executing program 5: 19:14:31 executing program 4: 19:14:31 executing program 0: 19:14:31 executing program 2: 19:14:31 executing program 3: 19:14:31 executing program 4: 19:14:31 executing program 5: 19:14:31 executing program 1: 19:14:31 executing program 2: 19:14:31 executing program 0: 19:14:31 executing program 4: 19:14:31 executing program 3: 19:14:31 executing program 1: 19:14:31 executing program 5: 19:14:31 executing program 0: 19:14:31 executing program 3: 19:14:31 executing program 2: 19:14:31 executing program 4: 19:14:31 executing program 5: 19:14:31 executing program 1: 19:14:31 executing program 0: 19:14:31 executing program 3: 19:14:31 executing program 2: 19:14:31 executing program 4: 19:14:31 executing program 5: 19:14:31 executing program 0: 19:14:31 executing program 3: 19:14:31 executing program 1: 19:14:31 executing program 2: 19:14:31 executing program 4: 19:14:31 executing program 5: 19:14:31 executing program 0: 19:14:31 executing program 1: 19:14:31 executing program 3: 19:14:31 executing program 5: 19:14:31 executing program 2: 19:14:32 executing program 4: 19:14:32 executing program 4: 19:14:32 executing program 5: 19:14:32 executing program 2: 19:14:32 executing program 3: 19:14:32 executing program 1: 19:14:32 executing program 0: 19:14:32 executing program 4: 19:14:32 executing program 1: 19:14:32 executing program 5: 19:14:32 executing program 2: 19:14:32 executing program 3: 19:14:32 executing program 0: 19:14:32 executing program 1: 19:14:32 executing program 3: 19:14:32 executing program 2: 19:14:32 executing program 4: 19:14:32 executing program 0: 19:14:32 executing program 5: 19:14:32 executing program 3: 19:14:32 executing program 2: 19:14:32 executing program 4: 19:14:32 executing program 0: 19:14:32 executing program 1: 19:14:32 executing program 5: 19:14:32 executing program 3: 19:14:32 executing program 2: 19:14:32 executing program 5: 19:14:32 executing program 4: 19:14:32 executing program 0: 19:14:32 executing program 1: 19:14:32 executing program 3: 19:14:32 executing program 2: 19:14:32 executing program 5: 19:14:32 executing program 4: 19:14:32 executing program 0: 19:14:32 executing program 1: 19:14:32 executing program 5: 19:14:32 executing program 2: 19:14:32 executing program 3: 19:14:32 executing program 4: 19:14:32 executing program 0: 19:14:32 executing program 1: 19:14:32 executing program 5: 19:14:32 executing program 2: 19:14:32 executing program 4: 19:14:32 executing program 3: 19:14:32 executing program 2: 19:14:32 executing program 4: 19:14:32 executing program 0: 19:14:32 executing program 1: 19:14:32 executing program 5: 19:14:32 executing program 3: 19:14:32 executing program 1: 19:14:32 executing program 2: 19:14:33 executing program 3: 19:14:33 executing program 0: 19:14:33 executing program 4: 19:14:33 executing program 5: 19:14:33 executing program 2: 19:14:33 executing program 1: 19:14:33 executing program 3: 19:14:33 executing program 5: 19:14:33 executing program 4: 19:14:33 executing program 0: 19:14:33 executing program 2: 19:14:33 executing program 1: 19:14:33 executing program 3: 19:14:33 executing program 5: 19:14:33 executing program 4: 19:14:33 executing program 0: 19:14:33 executing program 2: 19:14:33 executing program 5: 19:14:33 executing program 1: 19:14:33 executing program 3: 19:14:33 executing program 4: 19:14:33 executing program 1: 19:14:33 executing program 2: 19:14:33 executing program 0: 19:14:33 executing program 5: 19:14:33 executing program 3: 19:14:33 executing program 4: 19:14:33 executing program 2: 19:14:33 executing program 0: 19:14:33 executing program 1: 19:14:33 executing program 5: 19:14:33 executing program 4: 19:14:33 executing program 3: 19:14:33 executing program 3: 19:14:33 executing program 3: 19:14:33 executing program 1: 19:14:33 executing program 0: 19:14:33 executing program 5: 19:14:33 executing program 2: 19:14:33 executing program 4: 19:14:33 executing program 3: 19:14:33 executing program 5: 19:14:33 executing program 0: 19:14:33 executing program 4: 19:14:33 executing program 3: 19:14:33 executing program 1: 19:14:33 executing program 2: 19:14:33 executing program 5: 19:14:33 executing program 0: 19:14:33 executing program 4: 19:14:33 executing program 2: 19:14:33 executing program 3: 19:14:33 executing program 5: 19:14:33 executing program 1: 19:14:33 executing program 0: 19:14:33 executing program 4: 19:14:34 executing program 2: 19:14:34 executing program 1: 19:14:34 executing program 3: 19:14:34 executing program 0: 19:14:34 executing program 5: 19:14:34 executing program 4: 19:14:34 executing program 2: 19:14:34 executing program 3: 19:14:34 executing program 1: 19:14:34 executing program 0: 19:14:34 executing program 4: 19:14:34 executing program 5: 19:14:34 executing program 2: 19:14:34 executing program 3: 19:14:34 executing program 0: 19:14:34 executing program 1: 19:14:34 executing program 4: 19:14:34 executing program 5: 19:14:34 executing program 2: 19:14:34 executing program 1: 19:14:34 executing program 3: 19:14:34 executing program 0: 19:14:34 executing program 4: 19:14:34 executing program 5: 19:14:34 executing program 2: 19:14:34 executing program 1: 19:14:34 executing program 3: 19:14:34 executing program 0: 19:14:34 executing program 4: 19:14:34 executing program 5: 19:14:34 executing program 1: 19:14:34 executing program 2: 19:14:34 executing program 3: 19:14:34 executing program 4: 19:14:34 executing program 0: 19:14:34 executing program 1: 19:14:34 executing program 5: 19:14:34 executing program 2: 19:14:34 executing program 3: 19:14:34 executing program 4: 19:14:34 executing program 0: 19:14:34 executing program 1: 19:14:34 executing program 5: 19:14:34 executing program 2: 19:14:34 executing program 3: 19:14:34 executing program 4: 19:14:34 executing program 1: 19:14:34 executing program 0: 19:14:34 executing program 2: 19:14:34 executing program 5: 19:14:34 executing program 3: 19:14:34 executing program 1: 19:14:34 executing program 4: 19:14:34 executing program 0: 19:14:34 executing program 5: 19:14:34 executing program 2: 19:14:34 executing program 3: 19:14:34 executing program 5: 19:14:34 executing program 1: 19:14:34 executing program 4: 19:14:34 executing program 0: 19:14:34 executing program 2: 19:14:34 executing program 3: 19:14:35 executing program 4: 19:14:35 executing program 5: 19:14:35 executing program 0: 19:14:35 executing program 1: 19:14:35 executing program 2: 19:14:35 executing program 4: 19:14:35 executing program 3: 19:14:35 executing program 5: 19:14:35 executing program 2: 19:14:35 executing program 4: 19:14:35 executing program 5: 19:14:35 executing program 0: 19:14:35 executing program 1: 19:14:35 executing program 2: 19:14:35 executing program 3: 19:14:35 executing program 0: 19:14:35 executing program 5: 19:14:35 executing program 4: 19:14:35 executing program 3: 19:14:35 executing program 1: 19:14:35 executing program 2: 19:14:35 executing program 0: 19:14:35 executing program 5: 19:14:35 executing program 4: 19:14:35 executing program 3: 19:14:35 executing program 2: 19:14:35 executing program 5: 19:14:35 executing program 1: 19:14:35 executing program 0: 19:14:35 executing program 4: 19:14:35 executing program 3: 19:14:35 executing program 2: 19:14:35 executing program 0: 19:14:35 executing program 5: 19:14:35 executing program 1: 19:14:35 executing program 4: 19:14:35 executing program 3: 19:14:35 executing program 1: 19:14:35 executing program 2: 19:14:35 executing program 0: 19:14:35 executing program 5: 19:14:35 executing program 3: 19:14:35 executing program 4: 19:14:35 executing program 1: 19:14:35 executing program 2: 19:14:35 executing program 0: 19:14:35 executing program 5: 19:14:35 executing program 3: 19:14:35 executing program 4: 19:14:35 executing program 1: 19:14:35 executing program 2: 19:14:35 executing program 0: 19:14:35 executing program 5: 19:14:35 executing program 3: 19:14:35 executing program 4: 19:14:35 executing program 1: 19:14:35 executing program 0: 19:14:35 executing program 2: 19:14:35 executing program 5: 19:14:35 executing program 3: 19:14:35 executing program 4: 19:14:35 executing program 0: 19:14:35 executing program 1: 19:14:35 executing program 2: 19:14:36 executing program 5: 19:14:36 executing program 3: 19:14:36 executing program 4: 19:14:36 executing program 5: 19:14:36 executing program 0: 19:14:36 executing program 1: 19:14:36 executing program 3: 19:14:36 executing program 2: 19:14:36 executing program 4: 19:14:36 executing program 5: 19:14:36 executing program 0: 19:14:36 executing program 2: 19:14:36 executing program 3: 19:14:36 executing program 1: 19:14:36 executing program 4: 19:14:36 executing program 5: 19:14:36 executing program 2: 19:14:36 executing program 3: 19:14:36 executing program 0: 19:14:36 executing program 1: 19:14:36 executing program 4: 19:14:36 executing program 2: 19:14:36 executing program 3: 19:14:36 executing program 5: 19:14:36 executing program 0: 19:14:36 executing program 1: 19:14:36 executing program 4: 19:14:36 executing program 2: 19:14:36 executing program 3: 19:14:36 executing program 5: 19:14:36 executing program 0: 19:14:36 executing program 1: 19:14:36 executing program 4: 19:14:36 executing program 2: 19:14:36 executing program 3: 19:14:36 executing program 5: 19:14:36 executing program 0: 19:14:36 executing program 4: 19:14:36 executing program 2: 19:14:36 executing program 1: 19:14:36 executing program 5: 19:14:36 executing program 3: 19:14:36 executing program 1: 19:14:36 executing program 2: 19:14:36 executing program 0: 19:14:36 executing program 4: 19:14:36 executing program 1: 19:14:36 executing program 2: 19:14:36 executing program 3: 19:14:36 executing program 5: 19:14:36 executing program 0: 19:14:36 executing program 2: 19:14:36 executing program 4: 19:14:36 executing program 1: 19:14:36 executing program 0: 19:14:36 executing program 4: 19:14:36 executing program 3: 19:14:36 executing program 5: 19:14:36 executing program 2: 19:14:36 executing program 1: 19:14:36 executing program 0: 19:14:36 executing program 3: 19:14:36 executing program 4: 19:14:36 executing program 5: 19:14:37 executing program 2: 19:14:37 executing program 1: 19:14:37 executing program 5: 19:14:37 executing program 1: 19:14:37 executing program 2: 19:14:37 executing program 4: 19:14:37 executing program 0: 19:14:37 executing program 3: 19:14:37 executing program 1: 19:14:37 executing program 5: 19:14:37 executing program 2: 19:14:37 executing program 0: 19:14:37 executing program 3: 19:14:37 executing program 4: 19:14:37 executing program 1: 19:14:37 executing program 5: 19:14:37 executing program 4: 19:14:37 executing program 2: 19:14:37 executing program 1: 19:14:37 executing program 0: 19:14:37 executing program 3: 19:14:37 executing program 5: 19:14:37 executing program 4: 19:14:37 executing program 2: 19:14:37 executing program 3: 19:14:37 executing program 1: 19:14:37 executing program 0: 19:14:37 executing program 5: 19:14:37 executing program 4: 19:14:37 executing program 2: 19:14:37 executing program 1: 19:14:37 executing program 5: 19:14:37 executing program 0: 19:14:37 executing program 3: 19:14:37 executing program 4: 19:14:37 executing program 1: 19:14:37 executing program 2: 19:14:37 executing program 3: 19:14:37 executing program 2: 19:14:37 executing program 0: 19:14:37 executing program 3: 19:14:37 executing program 4: 19:14:37 executing program 5: 19:14:37 executing program 1: 19:14:37 executing program 2: 19:14:37 executing program 0: 19:14:37 executing program 3: 19:14:37 executing program 1: 19:14:37 executing program 4: 19:14:37 executing program 5: 19:14:37 executing program 1: 19:14:37 executing program 2: 19:14:37 executing program 3: 19:14:37 executing program 0: 19:14:37 executing program 4: 19:14:37 executing program 5: 19:14:37 executing program 1: 19:14:37 executing program 2: 19:14:37 executing program 3: 19:14:37 executing program 0: 19:14:38 executing program 4: 19:14:38 executing program 5: 19:14:38 executing program 1: 19:14:38 executing program 2: 19:14:38 executing program 0: 19:14:38 executing program 3: 19:14:38 executing program 1: 19:14:38 executing program 4: 19:14:38 executing program 5: 19:14:38 executing program 0: 19:14:38 executing program 2: 19:14:38 executing program 3: 19:14:38 executing program 5: 19:14:38 executing program 1: 19:14:38 executing program 4: 19:14:38 executing program 0: 19:14:38 executing program 2: 19:14:38 executing program 3: 19:14:38 executing program 5: 19:14:38 executing program 1: 19:14:38 executing program 4: 19:14:38 executing program 5: 19:14:38 executing program 0: 19:14:38 executing program 2: 19:14:38 executing program 3: 19:14:38 executing program 1: 19:14:38 executing program 4: 19:14:38 executing program 5: 19:14:38 executing program 2: 19:14:38 executing program 3: 19:14:38 executing program 0: 19:14:38 executing program 1: 19:14:38 executing program 5: 19:14:38 executing program 4: 19:14:38 executing program 0: 19:14:38 executing program 3: 19:14:38 executing program 2: 19:14:38 executing program 5: 19:14:38 executing program 1: 19:14:38 executing program 0: 19:14:38 executing program 2: 19:14:38 executing program 4: 19:14:38 executing program 3: 19:14:38 executing program 1: 19:14:38 executing program 5: 19:14:38 executing program 4: 19:14:38 executing program 2: 19:14:38 executing program 0: 19:14:38 executing program 3: 19:14:38 executing program 1: 19:14:38 executing program 4: 19:14:38 executing program 5: 19:14:38 executing program 3: 19:14:38 executing program 2: 19:14:38 executing program 4: 19:14:38 executing program 0: 19:14:38 executing program 1: 19:14:39 executing program 3: 19:14:39 executing program 5: 19:14:39 executing program 2: 19:14:39 executing program 4: 19:14:39 executing program 0: 19:14:39 executing program 1: 19:14:39 executing program 5: 19:14:39 executing program 3: 19:14:39 executing program 2: 19:14:39 executing program 4: 19:14:39 executing program 5: 19:14:39 executing program 1: 19:14:39 executing program 0: 19:14:39 executing program 3: 19:14:39 executing program 4: 19:14:39 executing program 2: 19:14:39 executing program 0: 19:14:39 executing program 1: 19:14:39 executing program 3: 19:14:39 executing program 5: 19:14:39 executing program 2: 19:14:39 executing program 4: 19:14:39 executing program 1: 19:14:39 executing program 5: 19:14:39 executing program 0: 19:14:39 executing program 3: 19:14:39 executing program 2: 19:14:39 executing program 4: 19:14:39 executing program 5: 19:14:39 executing program 0: 19:14:39 executing program 3: 19:14:39 executing program 1: 19:14:39 executing program 2: 19:14:39 executing program 4: 19:14:39 executing program 5: 19:14:39 executing program 3: 19:14:39 executing program 0: 19:14:39 executing program 2: 19:14:39 executing program 1: 19:14:39 executing program 4: 19:14:39 executing program 5: 19:14:39 executing program 3: 19:14:39 executing program 2: 19:14:39 executing program 0: 19:14:39 executing program 1: 19:14:39 executing program 3: 19:14:39 executing program 5: 19:14:39 executing program 4: 19:14:39 executing program 2: 19:14:39 executing program 0: 19:14:39 executing program 1: 19:14:39 executing program 5: 19:14:39 executing program 3: 19:14:39 executing program 4: 19:14:39 executing program 2: 19:14:39 executing program 1: 19:14:39 executing program 0: 19:14:39 executing program 5: 19:14:39 executing program 3: 19:14:40 executing program 4: 19:14:40 executing program 2: 19:14:40 executing program 1: 19:14:40 executing program 0: 19:14:40 executing program 5: 19:14:40 executing program 4: 19:14:40 executing program 3: 19:14:40 executing program 0: 19:14:40 executing program 1: 19:14:40 executing program 2: 19:14:40 executing program 4: 19:14:40 executing program 5: 19:14:40 executing program 3: 19:14:40 executing program 2: 19:14:40 executing program 0: 19:14:40 executing program 4: 19:14:40 executing program 1: 19:14:40 executing program 5: 19:14:40 executing program 3: 19:14:40 executing program 2: 19:14:40 executing program 0: 19:14:40 executing program 1: 19:14:40 executing program 4: 19:14:40 executing program 0: 19:14:40 executing program 3: 19:14:40 executing program 5: 19:14:40 executing program 2: 19:14:40 executing program 4: 19:14:40 executing program 1: 19:14:40 executing program 2: 19:14:40 executing program 0: 19:14:40 executing program 3: 19:14:40 executing program 5: 19:14:40 executing program 1: 19:14:40 executing program 2: 19:14:40 executing program 4: 19:14:40 executing program 3: 19:14:40 executing program 0: 19:14:40 executing program 5: 19:14:40 executing program 1: 19:14:40 executing program 2: 19:14:40 executing program 4: 19:14:40 executing program 3: 19:14:40 executing program 0: 19:14:40 executing program 5: 19:14:40 executing program 1: 19:14:40 executing program 4: 19:14:40 executing program 3: 19:14:40 executing program 2: 19:14:40 executing program 0: 19:14:40 executing program 5: 19:14:40 executing program 1: 19:14:40 executing program 4: 19:14:40 executing program 3: 19:14:41 executing program 2: 19:14:41 executing program 0: 19:14:41 executing program 1: 19:14:41 executing program 4: 19:14:41 executing program 5: 19:14:41 executing program 3: 19:14:41 executing program 2: 19:14:41 executing program 0: 19:14:41 executing program 4: 19:14:41 executing program 5: 19:14:41 executing program 1: 19:14:41 executing program 2: 19:14:41 executing program 3: 19:14:41 executing program 0: 19:14:41 executing program 3: 19:14:41 executing program 5: 19:14:41 executing program 1: 19:14:41 executing program 4: 19:14:41 executing program 2: 19:14:41 executing program 0: 19:14:41 executing program 5: 19:14:41 executing program 1: 19:14:41 executing program 5: 19:14:41 executing program 2: 19:14:41 executing program 4: 19:14:41 executing program 3: 19:14:41 executing program 0: 19:14:41 executing program 3: 19:14:41 executing program 1: 19:14:41 executing program 4: 19:14:41 executing program 0: 19:14:41 executing program 5: 19:14:41 executing program 2: 19:14:41 executing program 3: 19:14:41 executing program 1: 19:14:41 executing program 4: 19:14:41 executing program 2: 19:14:41 executing program 5: 19:14:41 executing program 0: 19:14:41 executing program 3: 19:14:41 executing program 1: 19:14:41 executing program 5: 19:14:41 executing program 4: 19:14:41 executing program 0: 19:14:41 executing program 2: 19:14:41 executing program 3: 19:14:41 executing program 1: 19:14:41 executing program 0: 19:14:41 executing program 5: 19:14:41 executing program 4: 19:14:41 executing program 2: 19:14:41 executing program 3: 19:14:41 executing program 1: 19:14:41 executing program 0: 19:14:41 executing program 5: 19:14:41 executing program 2: 19:14:41 executing program 1: 19:14:41 executing program 4: 19:14:42 executing program 3: 19:14:42 executing program 1: 19:14:42 executing program 0: 19:14:42 executing program 5: 19:14:42 executing program 4: 19:14:42 executing program 1: 19:14:42 executing program 2: 19:14:42 executing program 3: 19:14:42 executing program 1: 19:14:42 executing program 4: 19:14:42 executing program 0: 19:14:42 executing program 2: 19:14:42 executing program 5: 19:14:42 executing program 3: 19:14:42 executing program 1: 19:14:42 executing program 0: 19:14:42 executing program 4: 19:14:42 executing program 5: 19:14:42 executing program 2: 19:14:42 executing program 3: 19:14:42 executing program 1: 19:14:42 executing program 4: 19:14:42 executing program 0: 19:14:42 executing program 2: 19:14:42 executing program 5: 19:14:42 executing program 3: 19:14:42 executing program 1: 19:14:42 executing program 4: 19:14:42 executing program 0: 19:14:42 executing program 2: 19:14:42 executing program 3: 19:14:42 executing program 5: 19:14:42 executing program 1: 19:14:42 executing program 4: 19:14:42 executing program 0: 19:14:42 executing program 2: 19:14:42 executing program 3: 19:14:42 executing program 1: 19:14:42 executing program 5: 19:14:42 executing program 4: 19:14:42 executing program 0: 19:14:42 executing program 2: 19:14:42 executing program 3: 19:14:42 executing program 1: 19:14:42 executing program 5: 19:14:42 executing program 0: 19:14:42 executing program 4: 19:14:42 executing program 2: 19:14:42 executing program 3: 19:14:42 executing program 1: 19:14:42 executing program 0: 19:14:42 executing program 5: 19:14:42 executing program 2: 19:14:42 executing program 4: 19:14:42 executing program 1: 19:14:42 executing program 3: 19:14:42 executing program 0: 19:14:43 executing program 5: 19:14:43 executing program 2: 19:14:43 executing program 4: 19:14:43 executing program 1: 19:14:43 executing program 0: 19:14:43 executing program 3: 19:14:43 executing program 5: 19:14:43 executing program 2: 19:14:43 executing program 0: 19:14:43 executing program 1: 19:14:43 executing program 4: 19:14:43 executing program 3: 19:14:43 executing program 0: 19:14:43 executing program 5: 19:14:43 executing program 2: 19:14:43 executing program 4: 19:14:43 executing program 1: 19:14:43 executing program 3: 19:14:43 executing program 5: 19:14:43 executing program 0: 19:14:43 executing program 4: 19:14:43 executing program 1: 19:14:43 executing program 5: 19:14:43 executing program 2: 19:14:43 executing program 3: 19:14:43 executing program 0: 19:14:43 executing program 4: 19:14:43 executing program 3: 19:14:43 executing program 5: 19:14:43 executing program 4: 19:14:43 executing program 2: 19:14:43 executing program 1: 19:14:43 executing program 0: 19:14:43 executing program 3: 19:14:43 executing program 4: 19:14:43 executing program 5: 19:14:43 executing program 1: 19:14:43 executing program 0: 19:14:43 executing program 2: 19:14:43 executing program 3: 19:14:43 executing program 4: 19:14:43 executing program 5: 19:14:43 executing program 2: 19:14:43 executing program 1: 19:14:43 executing program 0: 19:14:43 executing program 3: 19:14:43 executing program 4: 19:14:43 executing program 5: 19:14:43 executing program 1: 19:14:43 executing program 2: 19:14:43 executing program 0: 19:14:43 executing program 3: 19:14:43 executing program 4: 19:14:43 executing program 5: 19:14:43 executing program 1: 19:14:43 executing program 2: 19:14:43 executing program 0: 19:14:43 executing program 3: 19:14:44 executing program 4: 19:14:44 executing program 5: 19:14:44 executing program 1: 19:14:44 executing program 2: 19:14:44 executing program 0: 19:14:44 executing program 3: 19:14:44 executing program 4: 19:14:44 executing program 5: 19:14:44 executing program 0: 19:14:44 executing program 1: 19:14:44 executing program 2: 19:14:44 executing program 4: 19:14:44 executing program 3: 19:14:44 executing program 0: 19:14:44 executing program 5: 19:14:44 executing program 1: 19:14:44 executing program 2: 19:14:44 executing program 5: 19:14:44 executing program 3: 19:14:44 executing program 4: 19:14:44 executing program 0: 19:14:44 executing program 1: 19:14:44 executing program 0: 19:14:44 executing program 3: 19:14:44 executing program 2: 19:14:44 executing program 4: 19:14:44 executing program 5: 19:14:44 executing program 1: 19:14:44 executing program 0: 19:14:44 executing program 3: 19:14:44 executing program 4: 19:14:44 executing program 5: 19:14:44 executing program 2: 19:14:44 executing program 4: 19:14:44 executing program 0: 19:14:44 executing program 3: 19:14:44 executing program 1: 19:14:44 executing program 5: 19:14:44 executing program 2: 19:14:44 executing program 4: 19:14:44 executing program 3: 19:14:44 executing program 0: 19:14:44 executing program 1: 19:14:44 executing program 5: 19:14:44 executing program 2: 19:14:44 executing program 3: 19:14:44 executing program 4: 19:14:44 executing program 5: 19:14:44 executing program 0: 19:14:44 executing program 1: 19:14:44 executing program 4: 19:14:44 executing program 2: 19:14:44 executing program 3: 19:14:44 executing program 5: 19:14:44 executing program 1: 19:14:44 executing program 0: 19:14:45 executing program 3: 19:14:45 executing program 4: 19:14:45 executing program 2: 19:14:45 executing program 5: 19:14:45 executing program 0: 19:14:45 executing program 1: 19:14:45 executing program 3: 19:14:45 executing program 2: 19:14:45 executing program 4: 19:14:45 executing program 5: 19:14:45 executing program 0: 19:14:45 executing program 1: 19:14:45 executing program 4: 19:14:45 executing program 2: 19:14:45 executing program 3: 19:14:45 executing program 0: 19:14:45 executing program 5: 19:14:45 executing program 3: 19:14:45 executing program 2: 19:14:45 executing program 1: 19:14:45 executing program 4: 19:14:45 executing program 0: 19:14:45 executing program 5: 19:14:45 executing program 3: 19:14:45 executing program 2: 19:14:45 executing program 1: 19:14:45 executing program 0: 19:14:45 executing program 4: 19:14:45 executing program 3: 19:14:45 executing program 5: 19:14:45 executing program 2: 19:14:45 executing program 1: 19:14:45 executing program 0: 19:14:45 executing program 4: 19:14:45 executing program 3: 19:14:45 executing program 2: 19:14:45 executing program 1: 19:14:45 executing program 5: 19:14:45 executing program 0: 19:14:45 executing program 4: 19:14:45 executing program 5: 19:14:45 executing program 2: 19:14:45 executing program 1: 19:14:45 executing program 3: 19:14:45 executing program 0: 19:14:45 executing program 4: 19:14:45 executing program 5: 19:14:45 executing program 2: 19:14:45 executing program 3: 19:14:45 executing program 1: 19:14:45 executing program 0: 19:14:45 executing program 5: 19:14:45 executing program 4: 19:14:45 executing program 1: 19:14:45 executing program 0: 19:14:45 executing program 2: 19:14:45 executing program 3: 19:14:46 executing program 5: 19:14:46 executing program 4: 19:14:46 executing program 3: 19:14:46 executing program 0: 19:14:46 executing program 5: 19:14:46 executing program 1: 19:14:46 executing program 2: 19:14:46 executing program 3: 19:14:46 executing program 5: 19:14:46 executing program 4: 19:14:46 executing program 1: 19:14:46 executing program 2: 19:14:46 executing program 0: 19:14:46 executing program 3: 19:14:46 executing program 5: 19:14:46 executing program 4: 19:14:46 executing program 2: 19:14:46 executing program 1: 19:14:46 executing program 0: 19:14:46 executing program 3: 19:14:46 executing program 5: 19:14:46 executing program 2: 19:14:46 executing program 4: 19:14:46 executing program 1: 19:14:46 executing program 0: 19:14:46 executing program 3: 19:14:46 executing program 5: 19:14:46 executing program 4: 19:14:46 executing program 1: 19:14:46 executing program 2: 19:14:46 executing program 0: 19:14:46 executing program 3: 19:14:46 executing program 5: 19:14:46 executing program 1: 19:14:46 executing program 4: 19:14:46 executing program 2: 19:14:46 executing program 3: 19:14:46 executing program 0: 19:14:46 executing program 1: 19:14:46 executing program 5: 19:14:46 executing program 4: 19:14:46 executing program 3: 19:14:46 executing program 2: 19:14:46 executing program 5: 19:14:46 executing program 1: 19:14:46 executing program 0: 19:14:46 executing program 4: 19:14:46 executing program 2: 19:14:46 executing program 3: 19:14:46 executing program 5: 19:14:46 executing program 0: 19:14:46 executing program 1: 19:14:46 executing program 2: 19:14:46 executing program 4: 19:14:46 executing program 3: 19:14:47 executing program 5: 19:14:47 executing program 0: 19:14:47 executing program 2: 19:14:47 executing program 3: 19:14:47 executing program 1: 19:14:47 executing program 4: 19:14:47 executing program 5: 19:14:47 executing program 0: 19:14:47 executing program 2: 19:14:47 executing program 4: 19:14:47 executing program 0: 19:14:47 executing program 3: 19:14:47 executing program 5: 19:14:47 executing program 1: 19:14:47 executing program 2: 19:14:47 executing program 4: 19:14:47 executing program 2: 19:14:47 executing program 3: 19:14:47 executing program 0: 19:14:47 executing program 1: 19:14:47 executing program 5: 19:14:47 executing program 4: 19:14:47 executing program 2: 19:14:47 executing program 0: 19:14:47 executing program 3: 19:14:47 executing program 1: 19:14:47 executing program 4: 19:14:47 executing program 5: 19:14:47 executing program 2: 19:14:47 executing program 1: 19:14:47 executing program 3: 19:14:47 executing program 0: 19:14:47 executing program 4: 19:14:47 executing program 5: 19:14:47 executing program 3: 19:14:47 executing program 2: 19:14:47 executing program 1: 19:14:47 executing program 4: 19:14:47 executing program 0: 19:14:47 executing program 5: 19:14:47 executing program 3: 19:14:47 executing program 2: 19:14:47 executing program 1: 19:14:47 executing program 0: 19:14:47 executing program 4: 19:14:47 executing program 5: 19:14:47 executing program 3: 19:14:47 executing program 2: 19:14:47 executing program 1: 19:14:47 executing program 0: 19:14:47 executing program 5: 19:14:47 executing program 4: 19:14:47 executing program 3: 19:14:47 executing program 2: 19:14:47 executing program 1: 19:14:47 executing program 4: 19:14:48 executing program 0: 19:14:48 executing program 5: 19:14:48 executing program 2: 19:14:48 executing program 1: 19:14:48 executing program 3: 19:14:48 executing program 0: 19:14:48 executing program 5: 19:14:48 executing program 4: 19:14:48 executing program 1: 19:14:48 executing program 2: 19:14:48 executing program 3: 19:14:48 executing program 5: 19:14:48 executing program 0: 19:14:48 executing program 4: 19:14:48 executing program 1: 19:14:48 executing program 2: 19:14:48 executing program 3: 19:14:48 executing program 5: 19:14:48 executing program 4: 19:14:48 executing program 5: 19:14:48 executing program 1: 19:14:48 executing program 2: 19:14:48 executing program 3: 19:14:48 executing program 0: 19:14:48 executing program 1: 19:14:48 executing program 4: 19:14:48 executing program 2: 19:14:48 executing program 3: 19:14:48 executing program 5: 19:14:48 executing program 0: 19:14:48 executing program 2: 19:14:48 executing program 3: 19:14:48 executing program 4: 19:14:48 executing program 1: 19:14:48 executing program 5: 19:14:48 executing program 0: 19:14:48 executing program 2: 19:14:48 executing program 3: 19:14:48 executing program 4: 19:14:48 executing program 1: 19:14:48 executing program 5: 19:14:48 executing program 0: 19:14:48 executing program 2: 19:14:48 executing program 0: 19:14:48 executing program 3: 19:14:48 executing program 4: 19:14:48 executing program 1: 19:14:48 executing program 5: 19:14:48 executing program 2: 19:14:48 executing program 0: 19:14:48 executing program 3: 19:14:48 executing program 1: 19:14:48 executing program 5: 19:14:48 executing program 4: 19:14:48 executing program 0: 19:14:48 executing program 2: 19:14:48 executing program 3: 19:14:49 executing program 1: 19:14:49 executing program 5: 19:14:49 executing program 4: 19:14:49 executing program 2: 19:14:49 executing program 0: 19:14:49 executing program 3: 19:14:49 executing program 4: 19:14:49 executing program 1: 19:14:49 executing program 5: 19:14:49 executing program 0: 19:14:49 executing program 3: 19:14:49 executing program 2: 19:14:49 executing program 1: 19:14:49 executing program 4: 19:14:49 executing program 5: 19:14:49 executing program 1: 19:14:49 executing program 0: 19:14:49 executing program 3: 19:14:49 executing program 2: 19:14:49 executing program 4: 19:14:49 executing program 3: 19:14:49 executing program 5: 19:14:49 executing program 1: 19:14:49 executing program 0: 19:14:49 executing program 2: 19:14:49 executing program 3: 19:14:49 executing program 4: 19:14:49 executing program 5: 19:14:49 executing program 0: 19:14:49 executing program 2: 19:14:49 executing program 1: 19:14:49 executing program 3: 19:14:49 executing program 4: 19:14:49 executing program 0: 19:14:49 executing program 5: 19:14:49 executing program 2: 19:14:49 executing program 1: 19:14:49 executing program 3: 19:14:49 executing program 5: 19:14:49 executing program 4: 19:14:49 executing program 0: 19:14:49 executing program 3: 19:14:49 executing program 2: 19:14:49 executing program 1: 19:14:49 executing program 0: 19:14:49 executing program 1: 19:14:49 executing program 5: 19:14:49 executing program 3: 19:14:49 executing program 4: 19:14:49 executing program 2: 19:14:49 executing program 0: 19:14:49 executing program 1: 19:14:49 executing program 4: 19:14:49 executing program 5: 19:14:49 executing program 2: 19:14:49 executing program 3: 19:14:50 executing program 0: 19:14:50 executing program 4: 19:14:50 executing program 1: 19:14:50 executing program 5: 19:14:50 executing program 2: 19:14:50 executing program 3: 19:14:50 executing program 4: 19:14:50 executing program 0: 19:14:50 executing program 1: 19:14:50 executing program 2: 19:14:50 executing program 5: 19:14:50 executing program 3: 19:14:50 executing program 4: 19:14:50 executing program 0: 19:14:50 executing program 1: 19:14:50 executing program 5: 19:14:50 executing program 2: 19:14:50 executing program 3: 19:14:50 executing program 4: 19:14:50 executing program 1: 19:14:50 executing program 2: 19:14:50 executing program 5: 19:14:50 executing program 0: 19:14:50 executing program 3: 19:14:50 executing program 5: 19:14:50 executing program 1: 19:14:50 executing program 4: 19:14:50 executing program 0: 19:14:50 executing program 2: 19:14:50 executing program 1: 19:14:50 executing program 3: 19:14:50 executing program 5: 19:14:50 executing program 4: 19:14:50 executing program 0: 19:14:50 executing program 2: 19:14:50 executing program 3: 19:14:50 executing program 1: 19:14:50 executing program 0: 19:14:50 executing program 4: 19:14:50 executing program 5: 19:14:50 executing program 2: 19:14:50 executing program 3: 19:14:50 executing program 1: 19:14:50 executing program 0: 19:14:50 executing program 4: 19:14:50 executing program 5: 19:14:50 executing program 2: 19:14:50 executing program 3: 19:14:50 executing program 1: 19:14:50 executing program 4: 19:14:50 executing program 0: 19:14:50 executing program 5: 19:14:50 executing program 2: 19:14:50 executing program 0: 19:14:50 executing program 1: 19:14:50 executing program 3: 19:14:50 executing program 4: 19:14:50 executing program 5: 19:14:51 executing program 1: 19:14:51 executing program 2: 19:14:51 executing program 0: 19:14:51 executing program 3: 19:14:51 executing program 4: 19:14:51 executing program 5: 19:14:51 executing program 1: 19:14:51 executing program 2: 19:14:51 executing program 5: 19:14:51 executing program 1: 19:14:51 executing program 2: 19:14:51 executing program 3: 19:14:51 executing program 0: 19:14:51 executing program 4: 19:14:51 executing program 1: 19:14:51 executing program 5: 19:14:51 executing program 2: 19:14:51 executing program 3: 19:14:51 executing program 0: 19:14:51 executing program 4: 19:14:51 executing program 2: 19:14:51 executing program 1: 19:14:51 executing program 3: 19:14:51 executing program 4: 19:14:51 executing program 5: 19:14:51 executing program 0: 19:14:51 executing program 2: 19:14:51 executing program 1: 19:14:51 executing program 4: 19:14:51 executing program 3: 19:14:51 executing program 0: 19:14:51 executing program 5: 19:14:51 executing program 1: 19:14:51 executing program 2: 19:14:51 executing program 4: 19:14:51 executing program 0: 19:14:51 executing program 5: 19:14:51 executing program 3: 19:14:51 executing program 1: 19:14:51 executing program 2: 19:14:51 executing program 0: 19:14:51 executing program 5: 19:14:51 executing program 4: 19:14:51 executing program 1: 19:14:51 executing program 3: 19:14:51 executing program 2: 19:14:51 executing program 0: 19:14:51 executing program 5: 19:14:51 executing program 4: 19:14:51 executing program 3: 19:14:51 executing program 1: 19:14:51 executing program 0: 19:14:51 executing program 2: 19:14:51 executing program 5: 19:14:52 executing program 4: 19:14:52 executing program 3: 19:14:52 executing program 1: 19:14:52 executing program 0: 19:14:52 executing program 2: 19:14:52 executing program 5: 19:14:52 executing program 1: 19:14:52 executing program 3: 19:14:52 executing program 4: 19:14:52 executing program 2: 19:14:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x4c, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x4c}}, 0x0) 19:14:52 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000400), 0x42) close(r0) dup(0xffffffffffffffff) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x200000032, 0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 19:14:52 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000001840)='$', 0x1}], 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:14:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0xc8201) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000240)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:14:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000240)) 19:14:52 executing program 3: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) madvise(&(0x7f000005b000/0x400000)=nil, 0x400000, 0x1000000000008) 19:14:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xc63b9e35) 19:14:52 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8000000000000, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/532], 0x2a8) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000600)={0x0, {0x2, 0x4c22, @multicast1=0xe0000014}, {0x2, 0x0, @remote}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}) mmap(&(0x7f0000011000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xf824b000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000000000}, 0x10906, 0xfffffffffffffffe, 0x1, 0x0, 0x4, 0x4, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000100)={'ip_vti0\x00', {0x2, 0x4e1e, @loopback}}) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x7a000000, &(0x7f0000000100)=ANY=[@ANYBLOB="75708565726469723d2e2f66696c65302c6c6f7765726469723d0e2f66696c6530b7776f726b6369723d2e2f66696c65315c00"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000140)="2c7fe74a0d52fb8e8e6e92a83c749fc7c0b85c1b3b846d73f95bbb71148b218f52e894", 0x23, 0x20000080, &(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x2, 0x3, 0x4, 0x2, {0xa, 0x4e21, 0x1, @remote, 0x4}}}, 0x80) io_submit(0x0, 0x2, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x2703000000000000, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x4f, r0, &(0x7f00000003c0)="6ca7b3dc3de09d76a70b68ae86eb158ee2ecb0fb24436f41ed7be82bc06144bec8a53b4ed9f047f30de788b7746142711cb4ef02f332be86eb87d175debb31d4713a11fbb27173460cb4a43ed3b8a562dab7454d2355ddc0a8e7844414330de8acc91261ecc86d7e70e20d4e90cfc086b293cc050e87ececcf94c9a5b5118182937858c912cf4dda0545c0dd0e7287581aa466f22cba40996970", 0x9a, 0xfff, 0x0, 0x0, r2}]) lstat(&(0x7f0000000300)='./file0\x00', 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0xc000, 0x2) 19:14:52 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa11a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') sendfile(r1, r2, 0x0, 0x1) 19:14:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400000000000080ffff000000", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000240)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x8009}}, 0x20}}, 0x0) 19:14:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) fallocate(r2, 0x0, 0x0, 0x4000) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000100)={0x9, 0x7, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x3, 0x5, "7842fcc4"}, 0xffff82c3, 0x0, @fd=r2, 0x6}) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x900}, 0x1c) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f00000001c0)={0x0, @reserved}) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0xffff58a0, @remote, 0x8}, 0x1c) 19:14:52 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1081.637261][ T4133] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1081.646823][ T4128] overlayfs: unrecognized mount option "up…erdir=./file0" or missing value [ 1081.662732][ T4133] bridge11: port 1(syz_tun) entered blocking state [ 1081.670128][ T4133] bridge11: port 1(syz_tun) entered disabled state [ 1081.713064][ T4133] device syz_tun entered promiscuous mode [ 1081.731065][ T4142] bridge11: port 1(syz_tun) entered blocking state [ 1081.737708][ T4142] bridge11: port 1(syz_tun) entered forwarding state 19:14:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000000c80), 0x4924924924924bd, 0x0) [ 1081.758933][ T4128] overlayfs: unrecognized mount option "up…erdir=./file0" or missing value 19:14:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 19:14:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000800)='./file0\x00') 19:14:52 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8000000000000, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/532], 0x2a8) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000600)={0x0, {0x2, 0x4c22, @multicast1=0xe0000014}, {0x2, 0x0, @remote}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}) mmap(&(0x7f0000011000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xf824b000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000000000}, 0x10906, 0xfffffffffffffffe, 0x1, 0x0, 0x4, 0x4, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000100)={'ip_vti0\x00', {0x2, 0x4e1e, @loopback}}) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x7a000000, &(0x7f0000000100)=ANY=[@ANYBLOB="75708565726469723d2e2f66696c65302c6c6f7765726469723d0e2f66696c6530b7776f726b6369723d2e2f66696c65315c00"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000140)="2c7fe74a0d52fb8e8e6e92a83c749fc7c0b85c1b3b846d73f95bbb71148b218f52e894", 0x23, 0x20000080, &(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x2, 0x3, 0x4, 0x2, {0xa, 0x4e21, 0x1, @remote, 0x4}}}, 0x80) io_submit(0x0, 0x2, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x2703000000000000, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x4f, r0, &(0x7f00000003c0)="6ca7b3dc3de09d76a70b68ae86eb158ee2ecb0fb24436f41ed7be82bc06144bec8a53b4ed9f047f30de788b7746142711cb4ef02f332be86eb87d175debb31d4713a11fbb27173460cb4a43ed3b8a562dab7454d2355ddc0a8e7844414330de8acc91261ecc86d7e70e20d4e90cfc086b293cc050e87ececcf94c9a5b5118182937858c912cf4dda0545c0dd0e7287581aa466f22cba40996970", 0x9a, 0xfff, 0x0, 0x0, r2}]) lstat(&(0x7f0000000300)='./file0\x00', 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0xc000, 0x2) 19:14:52 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1081.915290][ T4155] IPVS: ftp: loaded support on port[0] = 21 [ 1081.939330][ T4161] overlayfs: unrecognized mount option "up…erdir=./file0" or missing value 19:14:52 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8000000000000, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/532], 0x2a8) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000600)={0x0, {0x2, 0x4c22, @multicast1=0xe0000014}, {0x2, 0x0, @remote}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}) mmap(&(0x7f0000011000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xf824b000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000000000}, 0x10906, 0xfffffffffffffffe, 0x1, 0x0, 0x4, 0x4, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000100)={'ip_vti0\x00', {0x2, 0x4e1e, @loopback}}) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x7a000000, &(0x7f0000000100)=ANY=[@ANYBLOB="75708565726469723d2e2f66696c65302c6c6f7765726469723d0e2f66696c6530b7776f726b6369723d2e2f66696c65315c00"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000140)="2c7fe74a0d52fb8e8e6e92a83c749fc7c0b85c1b3b846d73f95bbb71148b218f52e894", 0x23, 0x20000080, &(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x2, 0x3, 0x4, 0x2, {0xa, 0x4e21, 0x1, @remote, 0x4}}}, 0x80) io_submit(0x0, 0x2, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x2703000000000000, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x4f, r0, &(0x7f00000003c0)="6ca7b3dc3de09d76a70b68ae86eb158ee2ecb0fb24436f41ed7be82bc06144bec8a53b4ed9f047f30de788b7746142711cb4ef02f332be86eb87d175debb31d4713a11fbb27173460cb4a43ed3b8a562dab7454d2355ddc0a8e7844414330de8acc91261ecc86d7e70e20d4e90cfc086b293cc050e87ececcf94c9a5b5118182937858c912cf4dda0545c0dd0e7287581aa466f22cba40996970", 0x9a, 0xfff, 0x0, 0x0, r2}]) lstat(&(0x7f0000000300)='./file0\x00', 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0xc000, 0x2) [ 1082.115146][ T4194] overlayfs: unrecognized mount option "up…erdir=./file0" or missing value 19:14:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="50010000100013070000000000000000ac1414aa00000000000000e0ffffff00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe78000000000000000000000000000000000000330000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000004c0014007368613235360000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c00150000000000f7baffff08"], 0x150}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0xf1, 0x0) 19:14:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') socket$inet6(0xa, 0x400000000001, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {&(0x7f00000000c0), r1}}, 0x18) 19:14:53 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:53 executing program 5: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000c40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3c0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x2f0, 0x2e8, 0x2e8, 0x2f0, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote, @private1, [], [], 'bridge_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x1c0, 0x1e8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0xf75c, 0xa6}}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x101}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420) 19:14:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 19:14:53 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8000000000000, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000002000000039321fc1b160d5b005609f7003d649f972a8095889161000048020000e000000000000000e000000000000000e0000000b0010000b0010000b0010000b0010000b001000003000000000000000000000002ac1e000100000000000000006c6f000000000000000000000000000000000000000000000000000068b464c107690000008aa2695b00000000000000000000000000000000000000000000000000000000000000000000000000c000e0000000000000000100000000000000000000000000280065636e00000000000000000000000000000000000000000000000000000068000000000000002800727066696c74657200000000000000000000000000000000000000000000000000009900000020004e4f545241434b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d00000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100"/532], 0x2a8) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000600)={0x0, {0x2, 0x4c22, @multicast1=0xe0000014}, {0x2, 0x0, @remote}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}) mmap(&(0x7f0000011000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xf824b000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000000000}, 0x10906, 0xfffffffffffffffe, 0x1, 0x0, 0x4, 0x4, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000100)={'ip_vti0\x00', {0x2, 0x4e1e, @loopback}}) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x7a000000, &(0x7f0000000100)=ANY=[@ANYBLOB="75708565726469723d2e2f66696c65302c6c6f7765726469723d0e2f66696c6530b7776f726b6369723d2e2f66696c65315c00"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000140)="2c7fe74a0d52fb8e8e6e92a83c749fc7c0b85c1b3b846d73f95bbb71148b218f52e894", 0x23, 0x20000080, &(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x2, 0x3, 0x4, 0x2, {0xa, 0x4e21, 0x1, @remote, 0x4}}}, 0x80) io_submit(0x0, 0x2, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x2703000000000000, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x4f, r0, &(0x7f00000003c0)="6ca7b3dc3de09d76a70b68ae86eb158ee2ecb0fb24436f41ed7be82bc06144bec8a53b4ed9f047f30de788b7746142711cb4ef02f332be86eb87d175debb31d4713a11fbb27173460cb4a43ed3b8a562dab7454d2355ddc0a8e7844414330de8acc91261ecc86d7e70e20d4e90cfc086b293cc050e87ececcf94c9a5b5118182937858c912cf4dda0545c0dd0e7287581aa466f22cba40996970", 0x9a, 0xfff, 0x0, 0x0, r2}]) lstat(&(0x7f0000000300)='./file0\x00', 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0xc000, 0x2) 19:14:53 executing program 5: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000c40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3c0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x2f0, 0x2e8, 0x2e8, 0x2f0, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote, @private1, [], [], 'bridge_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x1c0, 0x1e8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x4}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0xf75c, 0xa6}}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x101}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420) 19:14:53 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) wait4(0x0, 0x0, 0x0, 0x0) 19:14:53 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000780)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86\x06\x00\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\x02j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x02\x00\x00\x00\x00\x00\x00\x00_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2\xb1]b\xad1\xf4\x055`\xd0\x03\x00\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcuj\x1ad:#\x96\xf9\xd3\x1c]ImZlU=.\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D\x00\x00\x00\x00H\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+r\xa0\xde\xa8W\x03\x9b;', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000240)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() perf_event_open(&(0x7f0000940000)={0x7, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 19:14:53 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:53 executing program 5: getpid() sched_setscheduler(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) io_setup(0xc786, &(0x7f0000000040)=0x0) io_submit(0x0, 0x0, 0x0) io_destroy(r0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, 0x0, 0x0) [ 1082.639327][ T4243] ERROR: Domain ' /sbin/init /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.4 proc:/self/fd/3' not defined. [ 1082.640381][ T4232] overlayfs: unrecognized mount option "up…erdir=./file0" or missing value 19:14:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) [ 1082.680981][ T4256] ptrace attach of "/root/syz-executor.0"[4250] was attempted by "/root/syz-executor.0"[4256] 19:14:53 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1082.738857][T31492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge11: link becomes ready 19:14:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 19:14:53 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8000000000000, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000002000000039321fc1b160d5b005609f7003d649f972a8095889161000048020000e000000000000000e000000000000000e0000000b0010000b0010000b0010000b0010000b001000003000000000000000000000002ac1e000100000000000000006c6f000000000000000000000000000000000000000000000000000068b464c107690000008aa2695b00000000000000000000000000000000000000000000000000000000000000000000000000c000e0000000000000000100000000000000000000000000280065636e00000000000000000000000000000000000000000000000000000068000000000000002800727066696c74657200000000000000000000000000000000000000000000000000009900000020004e4f545241434b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d00000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100"/532], 0x2a8) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000600)={0x0, {0x2, 0x4c22, @multicast1=0xe0000014}, {0x2, 0x0, @remote}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}) mmap(&(0x7f0000011000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xf824b000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000000000}, 0x10906, 0xfffffffffffffffe, 0x1, 0x0, 0x4, 0x4, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000100)={'ip_vti0\x00', {0x2, 0x4e1e, @loopback}}) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x7a000000, &(0x7f0000000100)=ANY=[@ANYBLOB="75708565726469723d2e2f66696c65302c6c6f7765726469723d0e2f66696c6530b7776f726b6369723d2e2f66696c65315c00"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000140)="2c7fe74a0d52fb8e8e6e92a83c749fc7c0b85c1b3b846d73f95bbb71148b218f52e894", 0x23, 0x20000080, &(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x2, 0x3, 0x4, 0x2, {0xa, 0x4e21, 0x1, @remote, 0x4}}}, 0x80) io_submit(0x0, 0x2, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x2703000000000000, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x4f, r0, &(0x7f00000003c0)="6ca7b3dc3de09d76a70b68ae86eb158ee2ecb0fb24436f41ed7be82bc06144bec8a53b4ed9f047f30de788b7746142711cb4ef02f332be86eb87d175debb31d4713a11fbb27173460cb4a43ed3b8a562dab7454d2355ddc0a8e7844414330de8acc91261ecc86d7e70e20d4e90cfc086b293cc050e87ececcf94c9a5b5118182937858c912cf4dda0545c0dd0e7287581aa466f22cba40996970", 0x9a, 0xfff, 0x0, 0x0, r2}]) lstat(&(0x7f0000000300)='./file0\x00', 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0xc000, 0x2) 19:14:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='map_files\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000280)=""/4072, 0xfe8) 19:14:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() rt_sigqueueinfo(r3, 0x11, &(0x7f0000000080)) 19:14:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 19:14:53 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1083.064601][ T4297] overlayfs: unrecognized mount option "up…erdir=./file0" or missing value 19:14:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, 0x1, 0x1, 0x301}, 0x14}}, 0x0) 19:14:54 executing program 5: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = epoll_create(0x1000958) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0xffffffff, &(0x7f0000000000), 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x4) 19:14:54 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 19:14:54 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:54 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x3, &(0x7f0000000080)={&(0x7f00000000c0)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x12, 0x1, 0x0, 0x7ffffffc}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x50}}, 0x0) 19:14:54 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) [ 1083.257371][ T4319] ptrace attach of "/root/syz-executor.5"[4311] was attempted by "/root/syz-executor.5"[4319] [ 1083.270359][ T4321] syz-executor.2: vmalloc: allocation failure: 17179869208 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 19:14:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x755, 0x9]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1083.316380][ T4321] CPU: 1 PID: 4321 Comm: syz-executor.2 Not tainted 5.9.0-rc3-syzkaller #0 [ 1083.324994][ T4321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.335123][ T4321] Call Trace: [ 1083.338411][ T4321] dump_stack+0x10f/0x19d [ 1083.342727][ T4321] warn_alloc+0x105/0x160 [ 1083.347057][ T4321] ? __vmalloc_node_range+0x74/0x530 [ 1083.352429][ T4321] ? should_fail+0x2a/0x250 [ 1083.356933][ T4321] __vmalloc_node_range+0x1e0/0x530 [ 1083.362197][ T4321] ? ip_set_alloc+0x51/0x60 [ 1083.366693][ T4321] vzalloc+0x59/0x70 [ 1083.370581][ T4321] ? ip_set_alloc+0x51/0x60 [ 1083.375700][ T4321] ip_set_alloc+0x51/0x60 [ 1083.380084][ T4321] hash_ip_create+0x398/0x890 [ 1083.384914][ T4321] ? __nla_parse+0x3c/0x50 [ 1083.389327][ T4321] ip_set_create+0x2d8/0x7f0 [ 1083.394044][ T4321] ? memchr+0x30/0x50 [ 1083.398086][ T4321] ? __nla_parse+0x3c/0x50 [ 1083.402700][ T4321] ? __rcu_read_unlock+0x4b/0x260 [ 1083.408156][ T4321] ? ip_set_protocol+0x2d0/0x2d0 [ 1083.413169][ T4321] nfnetlink_rcv_msg+0x3d4/0x4a0 [ 1083.418141][ T4321] ? preempt_count_add+0x41/0x90 [ 1083.423096][ T4321] ? prep_new_page+0xb8/0x240 [ 1083.427960][ T4321] ? get_page_from_freelist+0x391/0x500 [ 1083.433495][ T4321] ? try_charge+0x35/0xac0 [ 1083.437905][ T4321] ? aa_get_newest_label+0x71/0x250 [ 1083.443106][ T4321] ? apparmor_capable+0xfb/0x160 [ 1083.448097][ T4321] netlink_rcv_skb+0x13e/0x240 [ 1083.453056][ T4321] ? nfnetlink_bind+0xb0/0xb0 [ 1083.457727][ T4321] nfnetlink_rcv+0x15d/0x1140 [ 1083.462392][ T4321] ? __kfree_skb+0xfe/0x150 [ 1083.467512][ T4321] ? consume_skb+0x4c/0x180 [ 1083.472125][ T4321] ? nlmon_xmit+0x5f/0x70 [ 1083.476560][ T4321] ? __this_cpu_preempt_check+0x18/0x20 [ 1083.482145][ T4321] ? __local_bh_enable_ip+0x48/0x70 [ 1083.487351][ T4321] ? local_bh_enable+0x1b/0x20 [ 1083.492157][ T4321] ? __dev_queue_xmit+0xc30/0x15a0 [ 1083.497281][ T4321] ? __skb_clone+0x2b9/0x2d0 [ 1083.501901][ T4321] ? __rcu_read_unlock+0x4b/0x260 [ 1083.506929][ T4321] ? netlink_deliver_tap+0x74/0x470 [ 1083.512127][ T4321] netlink_unicast+0x5e2/0x6b0 [ 1083.516950][ T4321] netlink_sendmsg+0x6d8/0x7a0 [ 1083.521729][ T4321] ? netlink_getsockopt+0x690/0x690 [ 1083.526961][ T4321] ____sys_sendmsg+0x360/0x4d0 [ 1083.531781][ T4321] ? import_iovec+0x171/0x1c0 [ 1083.536456][ T4321] __sys_sendmsg+0x1df/0x260 [ 1083.541034][ T4321] ? percpu_counter_add_batch+0x112/0x130 [ 1083.546839][ T4321] ? alloc_empty_file+0x107/0x1c0 [ 1083.551992][ T4321] ? errseq_sample+0x2b/0x40 [ 1083.556573][ T4321] ? alloc_file+0x253/0x280 [ 1083.561072][ T4321] ? ktime_get_ts64+0x2d9/0x310 [ 1083.566307][ T4321] ? set_normalized_timespec64+0x104/0x130 [ 1083.572185][ T4321] ? check_preemption_disabled+0x51/0x140 [ 1083.577991][ T4321] ? debug_smp_processor_id+0x18/0x20 [ 1083.584138][ T4321] __x64_sys_sendmsg+0x42/0x50 [ 1083.588903][ T4321] do_syscall_64+0x39/0x80 [ 1083.593371][ T4321] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1083.599382][ T4321] RIP: 0033:0x45d5b9 [ 1083.603259][ T4321] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1083.623643][ T4321] RSP: 002b:00007f089fb35c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1083.632098][ T4321] RAX: ffffffffffffffda RBX: 0000000000029600 RCX: 000000000045d5b9 [ 1083.640109][ T4321] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000006 [ 1083.648193][ T4321] RBP: 000000000118cf80 R08: 0000000000000000 R09: 0000000000000000 [ 1083.656151][ T4321] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118cf4c [ 1083.664107][ T4321] R13: 00007ffe5679d11f R14: 00007f089fb369c0 R15: 000000000118cf4c [ 1083.697487][ T4315] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1083.717300][ T4315] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1083.724658][ T4315] loop4: p2 < > 19:14:54 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) [ 1083.762655][ T4321] Mem-Info: [ 1083.765826][ T4321] active_anon:8427 inactive_anon:202362 isolated_anon:0 [ 1083.765826][ T4321] active_file:33237 inactive_file:73257 isolated_file:0 [ 1083.765826][ T4321] unevictable:0 dirty:710 writeback:0 [ 1083.765826][ T4321] slab_reclaimable:11006 slab_unreclaimable:33315 [ 1083.765826][ T4321] mapped:60232 shmem:17718 pagetables:4265 bounce:0 [ 1083.765826][ T4321] free:1125629 free_pcp:1347 free_cma:0 19:14:54 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:54 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) [ 1083.804740][ T4321] Node 0 active_anon:33708kB inactive_anon:807348kB active_file:132804kB inactive_file:293028kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:240928kB dirty:2840kB writeback:0kB shmem:70872kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 698368kB writeback_tmp:0kB kernel_stack:6592kB all_unreclaimable? no 19:14:54 executing program 5: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x1, 0x0) sendmsg$DEVLINK_CMD_PORT_SPLIT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) mount$fuse(0x0, 0x0, &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYRESHEX, @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(0xffffffffffffffff, &(0x7f00000077c0)={0x2020}, 0x2020) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="1b2603927f1f6588b967481241ba7860ac5cf65ac618ded8974895abea13b4834ff922b3f1e0b02bd67aa03059bcecc7a95433a3a07e758044ab4ea6f7ae55d88f5ef93a1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 19:14:54 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) membarrier(0x1, 0x0) 19:14:54 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:54 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 19:14:54 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1084.018134][ T4321] Node 1 active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:64kB all_unreclaimable? no 19:14:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000140)=0xd916, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x26) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000180), 0x4) [ 1084.057265][ T4321] Node 0 DMA free:15904kB min:188kB low:232kB high:276kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1084.091257][ T4321] lowmem_reserve[]: 0 2848 3555 3555 3555 [ 1084.097167][ T4321] Node 0 DMA32 free:676320kB min:34912kB low:43640kB high:52368kB reserved_highatomic:0KB active_anon:17404kB inactive_anon:441592kB active_file:65536kB inactive_file:189676kB unevictable:0kB writepending:272kB present:3129332kB managed:2918584kB mlocked:0kB pagetables:9424kB bounce:0kB free_pcp:2228kB local_pcp:972kB free_cma:0kB [ 1084.140461][ T4377] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1084.159068][ T4377] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1084.173451][ T4377] loop4: p2 < > [ 1084.235843][ T4321] lowmem_reserve[]: 0 0 707 707 707 [ 1084.242621][ T4321] Node 0 Normal free:10712kB min:8672kB low:10840kB high:13008kB reserved_highatomic:0KB active_anon:16304kB inactive_anon:372076kB active_file:67268kB inactive_file:101052kB unevictable:0kB writepending:220kB present:786432kB managed:724524kB mlocked:0kB pagetables:7780kB bounce:0kB free_pcp:2428kB local_pcp:1288kB free_cma:0kB [ 1084.274499][ T4321] lowmem_reserve[]: 0 0 0 0 0 [ 1084.279214][ T4321] Node 1 Normal free:3798276kB min:46332kB low:57912kB high:69492kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870248kB mlocked:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1084.308719][ T4321] lowmem_reserve[]: 0 0 0 0 0 [ 1084.313604][ T4321] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1084.328492][ T4321] Node 0 DMA32: 9*4kB (E) 21*8kB (E) 4*16kB (UE) 26*32kB (UME) 39*64kB (UME) 24*128kB (UME) 43*256kB (UM) 37*512kB (UM) 20*1024kB (UME) 8*2048kB (UM) 147*4096kB (UM) = 675596kB [ 1084.346718][ T4321] Node 0 Normal: 10*4kB (ME) 12*8kB (ME) 41*16kB (M) 0*32kB 1*64kB (M) 1*128kB (M) 0*256kB 7*512kB (M) 6*1024kB (M) 0*2048kB 0*4096kB = 10712kB [ 1084.362613][ T4321] Node 1 Normal: 7*4kB (U) 7*8kB (U) 7*16kB (UE) 8*32kB (UME) 3*64kB (UE) 1*128kB (E) 2*256kB (UE) 2*512kB (ME) 1*1024kB (M) 1*2048kB (M) 926*4096kB (M) = 3798276kB [ 1084.379614][ T4321] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1084.389640][ T4321] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1084.399543][ T4321] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1084.409359][ T4321] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1084.418941][ T4321] 104534 total pagecache pages [ 1084.423705][ T4321] 0 pages in swap cache [ 1084.428464][ T4321] Swap cache stats: add 0, delete 0, find 0/0 19:14:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0xa6, 0x0) 19:14:55 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 19:14:55 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 19:14:55 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0xbc, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x8c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x7c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x14}}, @IFLA_VLAN_EGRESS_QOS={0x64, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3ac0, 0x5ab}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x40, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x80000000}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x800, 0x80000000}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x401}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0x2}}]}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xbc}}, 0x0) 19:14:55 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1084.434555][ T4321] Free swap = 0kB [ 1084.438696][ T4321] Total swap = 0kB [ 1084.442821][ T4321] 1965979 pages RAM [ 1084.446633][ T4321] 0 pages HighMem/MovableOnly [ 1084.462682][ T4321] 83664 pages reserved [ 1084.466750][ T4321] 0 pages cma reserved 19:14:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 19:14:55 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/route\x00') dup3(r3, r0, 0x0) 19:14:55 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 19:14:55 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r4, &(0x7f0000000000)=[{&(0x7f0000000180)='V', 0x1}], 0x1, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x2000005) 19:14:55 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 19:14:55 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0xbc, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x8c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x7c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x14}}, @IFLA_VLAN_EGRESS_QOS={0x64, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3ac0, 0x5ab}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x40, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x80000000}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x800, 0x80000000}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x401}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0x2}}]}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xbc}}, 0x0) 19:14:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 19:14:55 executing program 2: 19:14:55 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:14:55 executing program 5: 19:14:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 19:14:55 executing program 0: 19:14:55 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:55 executing program 2: 19:14:55 executing program 5: 19:14:55 executing program 0: 19:14:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 19:14:55 executing program 2: 19:14:55 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:14:55 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:55 executing program 5: 19:14:56 executing program 0: 19:14:56 executing program 2: 19:14:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 19:14:56 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:56 executing program 5: 19:14:56 executing program 0: 19:14:56 executing program 2: 19:14:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 19:14:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:14:56 executing program 5: 19:14:56 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 19:14:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 19:14:56 executing program 0: 19:14:56 executing program 2: 19:14:56 executing program 5: [ 1085.432742][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 19:14:56 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 19:14:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 19:14:56 executing program 0: 19:14:56 executing program 5: [ 1085.479053][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1085.502707][ T5080] loop4: p2 < > 19:14:56 executing program 2: 19:14:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:56 executing program 5: 19:14:56 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 19:14:56 executing program 2: 19:14:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 19:14:56 executing program 0: 19:14:56 executing program 5: 19:14:56 executing program 2: 19:14:56 executing program 0: 19:14:56 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 19:14:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 19:14:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:56 executing program 5: 19:14:56 executing program 2: 19:14:56 executing program 0: 19:14:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 19:14:56 executing program 2: 19:14:56 executing program 0: 19:14:56 executing program 5: 19:14:56 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 19:14:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x48}}, 0x0) 19:14:56 executing program 2: 19:14:56 executing program 0: 19:14:56 executing program 5: 19:14:56 executing program 2: 19:14:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:56 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 19:14:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x48}}, 0x0) 19:14:56 executing program 0: 19:14:56 executing program 5: 19:14:56 executing program 2: 19:14:56 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x48}}, 0x0) 19:14:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:57 executing program 5: 19:14:57 executing program 0: 19:14:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x50}}, 0x0) 19:14:57 executing program 2: [ 1086.230481][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1086.265485][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 19:14:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x50}}, 0x0) [ 1086.282006][ T5080] loop4: p2 < > 19:14:57 executing program 5: 19:14:57 executing program 0: 19:14:57 executing program 2: 19:14:57 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:57 executing program 5: 19:14:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x50}}, 0x0) 19:14:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:57 executing program 0: 19:14:57 executing program 5: 19:14:57 executing program 2: 19:14:57 executing program 0: 19:14:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x38, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x38}}, 0x0) 19:14:57 executing program 5: 19:14:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:57 executing program 2: 19:14:57 executing program 0: 19:14:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x38, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x38}}, 0x0) 19:14:57 executing program 5: 19:14:57 executing program 2: 19:14:57 executing program 0: [ 1086.743670][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 19:14:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:57 executing program 5: 19:14:57 executing program 2: 19:14:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:57 executing program 0: 19:14:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x38, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x38}}, 0x0) [ 1086.793251][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1086.823387][ T5080] loop4: p2 < > 19:14:57 executing program 5: 19:14:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:57 executing program 0: 19:14:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 19:14:57 executing program 2: 19:14:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 19:14:57 executing program 5: 19:14:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:57 executing program 2: 19:14:57 executing program 0: 19:14:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 19:14:57 executing program 5: 19:14:57 executing program 0: 19:14:57 executing program 2: 19:14:57 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 19:14:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 19:14:58 executing program 0: 19:14:58 executing program 5: 19:14:58 executing program 2: 19:14:58 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 19:14:58 executing program 5: 19:14:58 executing program 0: 19:14:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 19:14:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:58 executing program 2: 19:14:58 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 19:14:58 executing program 0: 19:14:58 executing program 5: [ 1087.404730][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 19:14:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 19:14:58 executing program 2: 19:14:58 executing program 0: 19:14:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 19:14:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1087.459329][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1087.487504][ T5080] loop4: p2 < > 19:14:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:58 executing program 5: 19:14:58 executing program 0: 19:14:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 19:14:58 executing program 2: 19:14:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:58 executing program 5: 19:14:58 executing program 0: 19:14:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 19:14:58 executing program 2: 19:14:58 executing program 0: 19:14:58 executing program 5: 19:14:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:58 executing program 1: 19:14:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:58 executing program 1: 19:14:58 executing program 2: 19:14:58 executing program 5: 19:14:58 executing program 0: 19:14:58 executing program 0: 19:14:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:58 executing program 2: 19:14:58 executing program 1: 19:14:58 executing program 5: 19:14:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:58 executing program 0: [ 1088.014824][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 19:14:58 executing program 2: 19:14:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:58 executing program 5: 19:14:58 executing program 1: [ 1088.072078][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1088.106695][ T5080] loop4: p2 < > 19:14:58 executing program 0: 19:14:58 executing program 2: 19:14:58 executing program 5: 19:14:58 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:14:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:59 executing program 0: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttynull\x00', 0x2001, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000140)=ANY=[], 0x200001d8) 19:14:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000580)="67e037f81ced25cc0220384896f1ac1dea61a7a765760036f300000000007d7cff30f363089c2840925900760000fa11427140722ddea3218fe55deb78d067d4329e000000d68dc712fa", 0x4a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 19:14:59 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:14:59 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3cwsgrVe\xd0\xec\xfaV', r0) keyctl$revoke(0x3, r0) 19:14:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:59 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:14:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:14:59 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000206000000000000000000040000000000000000000000000000000000000000000000000000000000000000004000000000000000000000040000000000000000000000000001fe738d7a310000000000ff070000000000000000000000e70000000000000000effff6ff00000000000000000000001f000000000000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000ceafffffff75435effc000000000000000000000000000000000000000016"], 0x12e) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/74, 0x4a}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000180), 0x4) 19:14:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:14:59 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1088.581178][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1088.595346][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1088.627572][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1088.661156][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 19:14:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1088.688538][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1088.741142][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1088.781540][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1088.817789][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1088.853404][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1088.888892][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1088.936993][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1088.963126][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1088.992588][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1089.022169][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1089.048845][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1089.076267][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1089.089080][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1089.096574][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 19:14:59 executing program 0: 19:14:59 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1089.120794][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1089.153182][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1089.161562][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1089.203992][T31428] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1089.241187][T31428] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on sz1 [ 1089.280788][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.306898][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.330879][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.347289][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.366281][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.377806][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.397312][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.412810][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.421486][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.432822][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.449764][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.474151][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.485025][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.509058][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.519528][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.526966][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.551995][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.560166][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.581504][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.605529][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.626161][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.645153][ T4779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1089.658884][ T4779] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on sz1 19:15:02 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x282, 0x0) write$cgroup_devices(r0, &(0x7f00000010c0)=ANY=[], 0x9) 19:15:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:15:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:02 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x4, {0xa, 0x0, 0x0, @dev}}}, 0x3a) 19:15:02 executing program 2: syz_emit_ethernet(0x400e, &(0x7f0000000080)={@local, @remote, @val, {@ipv6}}, 0x0) 19:15:02 executing program 2: r0 = creat(&(0x7f0000000380)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9c12) unlink(&(0x7f0000000040)='./file0\x00') 19:15:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:02 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b}) 19:15:02 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x76, 0x141201) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x0, 0x1}]}) 19:15:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:15:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:02 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/drivers\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) dup2(r1, r0) 19:15:02 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="a3fe"], 0xfea3}}, 0x0) 19:15:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket(0x1, 0x5, 0x0) dup(r1) dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000033000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x200, 0x2d}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) pipe2(&(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000002f000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 19:15:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1091.825584][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1091.850133][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1091.863990][ T5080] loop4: p2 < > [ 1091.938913][ T4928] kvm [4926]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 19:15:02 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r2}, 0xc) 19:15:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pause() 19:15:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1092.064735][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1092.075577][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1092.084602][ T5080] loop4: p2 < > 19:15:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:15:02 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:03 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:15:03 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:03 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) [ 1092.353205][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1092.384857][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1092.401209][ T5080] loop4: p2 < > [ 1092.579121][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1092.590307][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1092.597491][ T5080] loop4: p2 < > [ 1092.714626][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1092.724668][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1092.731964][ T5080] loop4: p2 < > 19:15:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0xc, 0x4) 19:15:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:03 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:15:03 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:03 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:15:04 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:04 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1093.268445][ T5055] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1093.464295][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1093.474919][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1093.482285][ T5080] loop4: p2 < > [ 1093.566842][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1093.576876][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1093.584057][ T5080] loop4: p2 < > 19:15:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:04 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:04 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:15:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1093.924383][ T5091] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:04 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:04 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1094.107827][ T5109] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1094.120607][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1094.146819][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1094.154066][ T5080] loop4: p2 < > [ 1094.307684][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1094.318161][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1094.324989][ T5080] loop4: p2 < > [ 1094.412213][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1094.424850][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1094.433278][ T5080] loop4: p2 < > 19:15:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:07 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:07 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:15:07 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) [ 1096.946065][ T5136] netlink: 41643 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:07 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:07 executing program 5: setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1097.100170][ T5156] netlink: 41643 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1097.245245][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1097.256689][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1097.265376][ T5080] loop4: p2 < > [ 1097.387859][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1097.397953][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1097.404859][ T5080] loop4: p2 < > [ 1097.494285][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1097.504386][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1097.512363][ T5080] loop4: p2 < > [ 1097.603038][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1097.613240][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1097.620013][ T5080] loop4: p2 < > 19:15:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:10 executing program 5: setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:10 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 19:15:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1100.045850][ T5199] netlink: 41643 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:10 executing program 5: setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000002c0)="2ef22e2e650f01b9000000000f01c40f00510b640f7811db130f069a030000000a01b8fb0000000f23c00f21f835030003000f23f8260f01c82e660fc4250100000002", 0x43}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 19:15:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:10 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1100.346391][ T5224] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1100.427839][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1100.447246][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1100.456681][ T5080] loop4: p2 < > [ 1100.709296][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1100.732187][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1100.739734][ T5080] loop4: p2 < > [ 1100.861558][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1100.873439][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1100.882672][ T5080] loop4: p2 < > [ 1101.029222][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1101.049765][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1101.066556][ T5080] loop4: p2 < > 19:15:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:13 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:13 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000080), 0x8) 19:15:13 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:13 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:13 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:13 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) [ 1103.120314][ T5267] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:14 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) [ 1103.257295][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1103.273026][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1103.281270][ T5080] loop4: p2 < > [ 1103.375983][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1103.386411][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1103.393888][ T5080] loop4: p2 < > [ 1105.067313][T31491] Bluetooth: hci5: command 0x0405 tx timeout 19:15:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x1c01) 19:15:16 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:16 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:16 executing program 3: r0 = gettid() perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, r0, 0x0, 0xffffffffffffffff, 0x7) 19:15:16 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:16 executing program 3: madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x10) 19:15:16 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:16 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f00000016c0)=[{{&(0x7f0000000100)=@tipc=@nameseq={0x1e, 0x8, 0x0, {0x2}}, 0x80, 0x0}}], 0x1, 0x0) 19:15:17 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000), 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) [ 1106.179325][ T5317] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1106.208545][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1106.222011][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1106.229073][ T5080] loop4: p2 < > 19:15:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') keyctl$setperm(0x5, 0x0, 0x11f176197f3eb739) keyctl$assume_authority(0x10, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1106.394404][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1106.405452][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1106.412401][ T5080] loop4: p2 < > 19:15:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x1c01) 19:15:17 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x1, 0x1) execve(&(0x7f00000008c0)='./file0\x00', 0x0, &(0x7f00000009c0)=[&(0x7f0000000980)='\x00']) 19:15:17 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000), 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') keyctl$setperm(0x5, 0x0, 0x11f176197f3eb739) keyctl$assume_authority(0x10, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:17 executing program 1: sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000035000511d25a80648c63940d0424fc60100006400a0009000200000037153e3708000a8004001000d1bd", 0x2e}], 0x1}, 0x0) 19:15:18 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000), 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) [ 1107.214817][ T5352] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') keyctl$setperm(0x5, 0x0, 0x11f176197f3eb739) keyctl$assume_authority(0x10, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:18 executing program 1: sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) 19:15:18 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) [ 1107.308735][ T5362] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1107.401277][ T5371] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1107.491966][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1107.502101][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1107.510613][ T5080] loop4: p2 < > [ 1107.598838][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1107.609044][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1107.615899][ T5080] loop4: p2 < > [ 1107.667040][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1107.677137][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1107.684850][ T5080] loop4: p2 < > 19:15:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x1c01) 19:15:19 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:19 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/511, 0x1ff, 0x1}]) 19:15:19 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(0xffffffffffffffff, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:19 executing program 1: sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1108.362422][ T5402] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1108.383214][ T5397] Dev loop3: unable to read RDB block 1 [ 1108.389649][ T5397] loop3: unable to read partition table 19:15:19 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(0xffffffffffffffff, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:19 executing program 1: r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1108.431871][ T5397] loop3: partition table beyond EOD, truncated 19:15:19 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1108.473580][ T5397] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:15:19 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(0xffffffffffffffff, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1108.522370][ T5415] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1108.582999][ T5397] Dev loop3: unable to read RDB block 1 [ 1108.589891][ T5397] loop3: unable to read partition table [ 1108.595875][ T5397] loop3: partition table beyond EOD, truncated [ 1108.608760][ T5397] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1108.728905][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1108.739067][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1108.746197][ T5080] loop4: p2 < > [ 1108.839356][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1108.850183][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1108.856954][ T5080] loop4: p2 < > 19:15:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:20 executing program 1: r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:20 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:20 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/511, 0x1ff, 0x1}]) 19:15:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1109.559395][ T5445] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:20 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:20 executing program 1: r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1109.637452][ T5447] Dev loop3: unable to read RDB block 1 [ 1109.643875][ T5447] loop3: unable to read partition table [ 1109.683686][ T5447] loop3: partition table beyond EOD, truncated [ 1109.731464][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1109.753858][ T5462] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1109.755660][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1109.764977][ T5447] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:15:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1109.773702][ T5080] loop4: p2 < > 19:15:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:20 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 19:15:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:23 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:23 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/511, 0x1ff, 0x1}]) 19:15:23 executing program 2: socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:23 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 19:15:23 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:23 executing program 2: socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:23 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) [ 1112.654558][ T5489] Dev loop3: unable to read RDB block 1 [ 1112.664530][ T5489] loop3: unable to read partition table [ 1112.672633][ T5489] loop3: partition table beyond EOD, truncated [ 1112.682295][ T5489] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:15:23 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 19:15:23 executing program 2: socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:23 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1112.711369][ T5501] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:23 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="38772355659216a419c96d50f90d19c67341bc2acc3b59b61dc324864b421afdf37bb9f54c331bbe4b3f552f9fd2e33823738fe4caff8e180f2dc08fcfdd26586ab0fb20493ee27b757e0c43ad3eb73b7ad06015e6157575b116e76d59a1df05bc50a26e0202d6601b75558e4ddd61b64418367aa58bbac8bdf3dcbaf4f550720f269142c04dce289d5d33d556e8eaaa280f5c829bf15addd2a3557ae05ce463f0184e1447a51569d356446b417948aa5d6975b1c2785ef1b20f15476212d6924036163c8b523e29c551b6a14af827602d3fec9243a618ff0d3906db5ae9d3656d8d2b0d6a9ffc2850d0e7d695361e048175cab385c841545e2aa79c1b4f6c8820a54f512622c698459774f01485cb7ef5d914c1fde15f6d84e139db9c0fbfeab53b639be237a92ce9bf7ac0dcd5063e085a1138293a58a670a8fbf77df3df62e0cfc0c7d1bc62321f8bc13c6d2637485001e743460b1f2e0046c0dc11f84b2a53c0ffb5e9477ee29c72288717b85984a612f0fe89ac6b3244d23c8e3f541e022cc720237f500aaf6ade034c0c8a8dde18cb2cec22bcb2ee0a5745287c886f245bd7c0e207f174504f984aa47784863f9676c0bc006d9c2d6feee0d3cc17aaa5dc3c063c61ef7143e49e23bdcf0de179cd4f4224a50758b885f66f2719af6ac40a00"/511, 0x1ff, 0x1}]) [ 1112.879420][ T5512] Dev loop3: unable to read RDB block 1 [ 1112.889698][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1112.899887][ T5512] loop3: unable to read partition table [ 1112.905656][ T5512] loop3: partition table beyond EOD, truncated [ 1112.907436][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1112.914941][ T5512] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1112.933172][ T5080] loop4: p2 < > [ 1113.091510][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1113.101866][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1113.109543][ T5080] loop4: p2 < > [ 1113.203228][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1113.213690][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1113.220851][ T5080] loop4: p2 < > 19:15:26 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:26 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x2) write$snddsp(r0, 0x0, 0x0) 19:15:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:26 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) 19:15:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:26 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:26 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:26 executing program 5: 19:15:26 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) 19:15:26 executing program 5: [ 1115.774539][ T5556] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:26 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 19:15:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:26 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) [ 1116.222250][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1116.232942][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1116.240150][ T5080] loop4: p2 < > [ 1116.317500][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1116.327528][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1116.334303][ T5080] loop4: p2 < > [ 1116.420436][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1116.430584][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1116.437408][ T5080] loop4: p2 < > 19:15:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:29 executing program 4: ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:29 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f00000005c0)) 19:15:29 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x28, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1141042, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x7) 19:15:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:29 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x3ff, 0x4) recvmmsg(r1, &(0x7f0000001340)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/226, 0xe2}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) close(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vlan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x20, 0x10, 0x401}, 0x20}}, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 19:15:29 executing program 4: ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1118.796403][ T5610] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1118.811641][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1118.834731][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 19:15:29 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f00000005c0)) 19:15:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1118.846654][ T5080] loop4: p2 < > 19:15:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1119.080398][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1119.090524][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1119.097435][ T5080] loop4: p2 < > [ 1119.185602][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1119.195730][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1119.202497][ T5080] loop4: p2 < > [ 1119.293155][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1119.303422][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1119.310303][ T5080] loop4: p2 < > 19:15:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:32 executing program 4: ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:32 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f00000005c0)) 19:15:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) 19:15:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:32 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{0x0, 0x0, 0x1}]) 19:15:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:32 executing program 4: perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) [ 1121.906792][ T5678] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1122.170527][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1122.182938][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1122.190559][ T5080] loop4: p2 < > [ 1122.362833][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1122.373030][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1122.380350][ T5080] loop4: p2 < > [ 1122.471815][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1122.481938][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1122.489155][ T5080] loop4: p2 < > 19:15:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x0, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:35 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{0x0, 0x0, 0x1}]) 19:15:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) 19:15:35 executing program 4: perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x0, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x0, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:35 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{0x0, 0x0, 0x1}]) 19:15:35 executing program 4: perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) [ 1124.899445][ T5767] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1125.171481][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1125.181801][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1125.188651][ T5080] loop4: p2 < > [ 1125.311079][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1125.321196][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1125.328306][ T5080] loop4: p2 < > 19:15:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:38 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300), 0x0, 0x1}]) 19:15:38 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) 19:15:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:38 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) 19:15:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:38 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300), 0x0, 0x1}]) [ 1127.962056][ T5840] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1127.972356][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 19:15:38 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) [ 1128.004050][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1128.011257][ T5080] loop4: p2 < > [ 1128.280284][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1128.290631][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1128.297618][ T5080] loop4: p2 < > [ 1128.350194][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1128.360421][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1128.367107][ T5080] loop4: p2 < > [ 1128.420460][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1128.430510][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1128.437263][ T5080] loop4: p2 < > 19:15:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:41 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) 19:15:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300), 0x0, 0x1}]) 19:15:41 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:41 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) 19:15:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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", 0x100, 0x1}]) [ 1131.028177][ T5896] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:41 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:41 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) 19:15:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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", 0x100, 0x1}]) [ 1131.147338][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1131.160986][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1131.185751][ T5080] loop4: p2 < > 19:15:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 1131.329198][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1131.344777][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1131.355861][ T5080] loop4: p2 < > [ 1131.414299][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1131.427834][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1131.436467][ T5080] loop4: p2 < > [ 1131.528491][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1131.540853][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1131.549385][ T5080] loop4: p2 < > 19:15:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 19:15:44 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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", 0x100, 0x1}]) 19:15:44 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 19:15:44 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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", 0x180, 0x1}]) 19:15:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 1134.062691][ T5956] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 19:15:45 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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", 0x180, 0x1}]) [ 1134.202401][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1134.226536][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1134.254595][ T5080] loop4: p2 < > [ 1134.392714][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1134.411293][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1134.424972][ T5080] loop4: p2 < > [ 1134.521282][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1134.534927][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1134.542878][ T5080] loop4: p2 < > [ 1134.597366][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1134.609382][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1134.618512][ T5080] loop4: p2 < > 19:15:47 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="38772355659216a419c96d50f90d19c67341bc2acc3b59b61dc324864b421afdf37bb9f54c331bbe4b3f552f9fd2e33823738fe4caff8e180f2dc08fcfdd26586ab0fb20493ee27b757e0c43ad3eb73b7ad06015e6157575b116e76d59a1df05bc50a26e0202d6601b75558e4ddd61b64418367aa58bbac8bdf3dcbaf4f550720f269142c04dce289d5d33d556e8eaaa280f5c829bf15addd2a3557ae05ce463f0184e1447a51569d356446b417948aa5d6975b1c2785ef1b20f15476212d6924036163c8b523e29c551b6a14af827602d3fec9243a618ff0d3906db5ae9d3656d8d2b0d6a9ffc2850d0e7d695361e048175cab385c841545e2aa79c1b4f6c8820a54f512622c698459774f01485cb7ef5d914c1fde15f6d84e139db9c0fbfeab53b639be237a92ce9bf7ac0dcd5063e085a1138293a58a670a8fbf77df3df62e0cfc0c7d1bc62321f8bc13c6d2637485001e743460b1f2e0046c0dc11f84b2a53c0ffb5e9477ee29c72288717b85984a612f0fe89ac6b3244d23c8e3f541e02", 0x180, 0x1}]) 19:15:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 19:15:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000080)) sendfile(0xffffffffffffffff, r0, 0x0, 0x1c01) 19:15:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:47 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000080)) sendfile(0xffffffffffffffff, r0, 0x0, 0x1c01) 19:15:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 19:15:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000080)) sendfile(0xffffffffffffffff, r0, 0x0, 0x1c01) 19:15:47 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="38772355659216a419c96d50f90d19c67341bc2acc3b59b61dc324864b421afdf37bb9f54c331bbe4b3f552f9fd2e33823738fe4caff8e180f2dc08fcfdd26586ab0fb20493ee27b757e0c43ad3eb73b7ad06015e6157575b116e76d59a1df05bc50a26e0202d6601b75558e4ddd61b64418367aa58bbac8bdf3dcbaf4f550720f269142c04dce289d5d33d556e8eaaa280f5c829bf15addd2a3557ae05ce463f0184e1447a51569d356446b417948aa5d6975b1c2785ef1b20f15476212d6924036163c8b523e29c551b6a14af827602d3fec9243a618ff0d3906db5ae9d3656d8d2b0d6a9ffc2850d0e7d695361e048175cab385c841545e2aa79c1b4f6c8820a54f512622c698459774f01485cb7ef5d914c1fde15f6d84e139db9c0fbfeab53b639be237a92ce9bf7ac0dcd5063e085a1138293a58a670a8fbf77df3df62e0cfc0c7d1bc62321f8bc13c6d2637485001e743460b1f2e0046c0dc11f84b2a53c0ffb5e9477ee29c72288717b85984a612f0fe89ac6b3244d23c8e3f541e022cc720237f500aaf6ade034c0c8a8dde18cb2cec22bcb2ee0a5745287c886f245bd7c0e207f174504f984aa47784863f9676c0bc006d9c2d6feee0d3cc17aaa5", 0x1c0, 0x1}]) 19:15:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 1137.128769][ T6012] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 19:15:48 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1c01) 19:15:48 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1c01) 19:15:48 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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", 0x1c0, 0x1}]) [ 1137.242663][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1137.256228][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1137.265166][ T5080] loop4: p2 < > [ 1137.527736][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1137.540358][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1137.548163][ T5080] loop4: p2 < > [ 1137.639661][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1137.654344][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1137.664245][ T5080] loop4: p2 < > [ 1137.719625][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1137.731490][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1137.741399][ T5080] loop4: p2 < > 19:15:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:48 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:48 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1c01) 19:15:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) 19:15:48 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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", 0x1c0, 0x1}]) 19:15:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) 19:15:48 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) 19:15:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:48 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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", 0x1e0, 0x1}]) [ 1138.027858][ T6083] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:48 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) [ 1138.283441][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1138.297290][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1138.304978][ T5080] loop4: p2 < > [ 1138.398537][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1138.412080][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1138.421170][ T5080] loop4: p2 < > [ 1138.518103][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1138.530077][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1138.539510][ T5080] loop4: p2 < > 19:15:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:49 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:49 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) 19:15:49 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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", 0x1e0, 0x1}]) 19:15:49 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) 19:15:49 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:49 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="38772355659216a419c96d50f90d19c67341bc2acc3b59b61dc324864b421afdf37bb9f54c331bbe4b3f552f9fd2e33823738fe4caff8e180f2dc08fcfdd26586ab0fb20493ee27b757e0c43ad3eb73b7ad06015e6157575b116e76d59a1df05bc50a26e0202d6601b75558e4ddd61b64418367aa58bbac8bdf3dcbaf4f550720f269142c04dce289d5d33d556e8eaaa280f5c829bf15addd2a3557ae05ce463f0184e1447a51569d356446b417948aa5d6975b1c2785ef1b20f15476212d6924036163c8b523e29c551b6a14af827602d3fec9243a618ff0d3906db5ae9d3656d8d2b0d6a9ffc2850d0e7d695361e048175cab385c841545e2aa79c1b4f6c8820a54f512622c698459774f01485cb7ef5d914c1fde15f6d84e139db9c0fbfeab53b639be237a92ce9bf7ac0dcd5063e085a1138293a58a670a8fbf77df3df62e0cfc0c7d1bc62321f8bc13c6d2637485001e743460b1f2e0046c0dc11f84b2a53c0ffb5e9477ee29c72288717b85984a612f0fe89ac6b3244d23c8e3f541e022cc720237f500aaf6ade034c0c8a8dde18cb2cec22bcb2ee0a5745287c886f245bd7c0e207f174504f984aa47784863f9676c0bc006d9c2d6feee0d3cc17aaa5dc3c063c61ef7143e49e23bdcf0de179cd4f4224a50758b885f66f2719af6ac4", 0x1e0, 0x1}]) [ 1138.919299][ T6130] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) 19:15:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) [ 1139.279577][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1139.290632][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1139.298538][ T5080] loop4: p2 < > [ 1139.389124][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1139.404568][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1139.415761][ T5080] loop4: p2 < > 19:15:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINK_NETNSID={0x8}]}, 0x28}}, 0x0) 19:15:50 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/496, 0x1f0, 0x1}]) 19:15:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:50 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINK_NETNSID={0x8}]}, 0x28}}, 0x0) 19:15:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:50 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/496, 0x1f0, 0x1}]) 19:15:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINK_NETNSID={0x8}]}, 0x28}}, 0x0) [ 1139.782616][ T6185] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) [ 1139.996356][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1140.009698][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1140.022217][ T5080] loop4: p2 < > [ 1140.099687][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1140.114190][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1140.123652][ T5080] loop4: p2 < > [ 1140.179339][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1140.191932][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1140.201854][ T5080] loop4: p2 < > [ 1140.256774][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1140.272756][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1140.282598][ T5080] loop4: p2 < > 19:15:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:51 executing program 5: 19:15:51 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/496, 0x1f0, 0x1}]) 19:15:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:51 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:51 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a0008", 0x15, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:51 executing program 5: 19:15:51 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/504, 0x1f8, 0x1}]) [ 1140.663980][ T6233] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:51 executing program 5: 19:15:51 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:51 executing program 5: 19:15:51 executing program 5: [ 1140.870897][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1140.888013][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1140.896404][ T5080] loop4: p2 < > [ 1141.012366][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1141.023883][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1141.032790][ T5080] loop4: p2 < > 19:15:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:52 executing program 5: [ 1141.504490][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1141.514843][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1141.522732][ T5080] loop4: p2 < > [ 1141.578011][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1141.589801][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1141.596727][ T5080] loop4: p2 < > 19:15:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:54 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="38772355659216a419c96d50f90d19c67341bc2acc3b59b61dc324864b421afdf37bb9f54c331bbe4b3f552f9fd2e33823738fe4caff8e180f2dc08fcfdd26586ab0fb20493ee27b757e0c43ad3eb73b7ad06015e6157575b116e76d59a1df05bc50a26e0202d6601b75558e4ddd61b64418367aa58bbac8bdf3dcbaf4f550720f269142c04dce289d5d33d556e8eaaa280f5c829bf15addd2a3557ae05ce463f0184e1447a51569d356446b417948aa5d6975b1c2785ef1b20f15476212d6924036163c8b523e29c551b6a14af827602d3fec9243a618ff0d3906db5ae9d3656d8d2b0d6a9ffc2850d0e7d695361e048175cab385c841545e2aa79c1b4f6c8820a54f512622c698459774f01485cb7ef5d914c1fde15f6d84e139db9c0fbfeab53b639be237a92ce9bf7ac0dcd5063e085a1138293a58a670a8fbf77df3df62e0cfc0c7d1bc62321f8bc13c6d2637485001e743460b1f2e0046c0dc11f84b2a53c0ffb5e9477ee29c72288717b85984a612f0fe89ac6b3244d23c8e3f541e022cc720237f500aaf6ade034c0c8a8dde18cb2cec22bcb2ee0a5745287c886f245bd7c0e207f174504f984aa47784863f9676c0bc006d9c2d6feee0d3cc17aaa5dc3c063c61ef7143e49e23bdcf0de179cd4f4224a50758b885f66f2719af6ac40a00"/504, 0x1f8, 0x1}]) 19:15:54 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a0008", 0x15, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:54 executing program 5: 19:15:54 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:54 executing program 5: 19:15:54 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1143.650383][ T6292] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:54 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/504, 0x1f8, 0x1}]) 19:15:54 executing program 5: [ 1143.699405][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1143.713054][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1143.729392][ T5080] loop4: p2 < > 19:15:54 executing program 5: 19:15:54 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/508, 0x1fc, 0x1}]) [ 1143.978891][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1143.991230][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1143.998189][ T5080] loop4: p2 < > [ 1144.091759][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1144.101834][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1144.108788][ T5080] loop4: p2 < > [ 1144.161330][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1144.171446][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1144.178477][ T5080] loop4: p2 < > 19:15:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:15:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:57 executing program 5: 19:15:57 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/508, 0x1fc, 0x1}]) 19:15:57 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a0008", 0x15, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:15:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:15:57 executing program 5: 19:15:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:57 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/508, 0x1fc, 0x1}]) [ 1146.694911][ T6348] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:57 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x42, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000d80)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1}, 0x50) stat(&(0x7f0000000300)='./file0\x00', 0x0) syz_fuse_handle_req(r0, &(0x7f0000008380)="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", 0x2000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:15:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x0, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:15:57 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="38772355659216a419c96d50f90d19c67341bc2acc3b59b61dc324864b421afdf37bb9f54c331bbe4b3f552f9fd2e33823738fe4caff8e180f2dc08fcfdd26586ab0fb20493ee27b757e0c43ad3eb73b7ad06015e6157575b116e76d59a1df05bc50a26e0202d6601b75558e4ddd61b64418367aa58bbac8bdf3dcbaf4f550720f269142c04dce289d5d33d556e8eaaa280f5c829bf15addd2a3557ae05ce463f0184e1447a51569d356446b417948aa5d6975b1c2785ef1b20f15476212d6924036163c8b523e29c551b6a14af827602d3fec9243a618ff0d3906db5ae9d3656d8d2b0d6a9ffc2850d0e7d695361e048175cab385c841545e2aa79c1b4f6c8820a54f512622c698459774f01485cb7ef5d914c1fde15f6d84e139db9c0fbfeab53b639be237a92ce9bf7ac0dcd5063e085a1138293a58a670a8fbf77df3df62e0cfc0c7d1bc62321f8bc13c6d2637485001e743460b1f2e0046c0dc11f84b2a53c0ffb5e9477ee29c72288717b85984a612f0fe89ac6b3244d23c8e3f541e022cc720237f500aaf6ade034c0c8a8dde18cb2cec22bcb2ee0a5745287c886f245bd7c0e207f174504f984aa47784863f9676c0bc006d9c2d6feee0d3cc17aaa5dc3c063c61ef7143e49e23bdcf0de179cd4f4224a50758b885f66f2719af6ac40a00"/510, 0x1fe, 0x1}]) [ 1146.837932][ T28] audit: type=1800 audit(1599419757.618:142): pid=6359 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16317 res=0 errno=0 [ 1147.001767][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1147.012740][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1147.021160][ T5080] loop4: p2 < > [ 1147.076108][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1147.086390][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1147.093791][ T5080] loop4: p2 < > [ 1147.199001][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1147.209097][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1147.215882][ T5080] loop4: p2 < > [ 1147.272186][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1147.282407][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1147.290218][ T5080] loop4: p2 < > 19:16:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:00 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x7840, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000400)='/dev/binder#\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:16:00 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x0, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:00 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/510, 0x1fe, 0x1}]) 19:16:00 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000", 0x19, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1149.699609][ T28] audit: type=1800 audit(1599419760.478:143): pid=6405 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16317 res=0 errno=0 [ 1149.730230][ T28] audit: type=1800 audit(1599419760.498:144): pid=6405 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16317 res=0 errno=0 19:16:00 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:00 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="38772355659216a419c96d50f90d19c67341bc2acc3b59b61dc324864b421afdf37bb9f54c331bbe4b3f552f9fd2e33823738fe4caff8e180f2dc08fcfdd26586ab0fb20493ee27b757e0c43ad3eb73b7ad06015e6157575b116e76d59a1df05bc50a26e0202d6601b75558e4ddd61b64418367aa58bbac8bdf3dcbaf4f550720f269142c04dce289d5d33d556e8eaaa280f5c829bf15addd2a3557ae05ce463f0184e1447a51569d356446b417948aa5d6975b1c2785ef1b20f15476212d6924036163c8b523e29c551b6a14af827602d3fec9243a618ff0d3906db5ae9d3656d8d2b0d6a9ffc2850d0e7d695361e048175cab385c841545e2aa79c1b4f6c8820a54f512622c698459774f01485cb7ef5d914c1fde15f6d84e139db9c0fbfeab53b639be237a92ce9bf7ac0dcd5063e085a1138293a58a670a8fbf77df3df62e0cfc0c7d1bc62321f8bc13c6d2637485001e743460b1f2e0046c0dc11f84b2a53c0ffb5e9477ee29c72288717b85984a612f0fe89ac6b3244d23c8e3f541e022cc720237f500aaf6ade034c0c8a8dde18cb2cec22bcb2ee0a5745287c886f245bd7c0e207f174504f984aa47784863f9676c0bc006d9c2d6feee0d3cc17aaa5dc3c063c61ef7143e49e23bdcf0de179cd4f4224a50758b885f66f2719af6ac40a00"/510, 0x1fe, 0x1}]) 19:16:00 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x0, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1149.783460][ T6416] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1149.845673][ T6421] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1149.855226][ T6421] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 19:16:00 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="38772355659216a419c96d50f90d19c67341bc2acc3b59b61dc324864b421afdf37bb9f54c331bbe4b3f552f9fd2e33823738fe4caff8e180f2dc08fcfdd26586ab0fb20493ee27b757e0c43ad3eb73b7ad06015e6157575b116e76d59a1df05bc50a26e0202d6601b75558e4ddd61b64418367aa58bbac8bdf3dcbaf4f550720f269142c04dce289d5d33d556e8eaaa280f5c829bf15addd2a3557ae05ce463f0184e1447a51569d356446b417948aa5d6975b1c2785ef1b20f15476212d6924036163c8b523e29c551b6a14af827602d3fec9243a618ff0d3906db5ae9d3656d8d2b0d6a9ffc2850d0e7d695361e048175cab385c841545e2aa79c1b4f6c8820a54f512622c698459774f01485cb7ef5d914c1fde15f6d84e139db9c0fbfeab53b639be237a92ce9bf7ac0dcd5063e085a1138293a58a670a8fbf77df3df62e0cfc0c7d1bc62321f8bc13c6d2637485001e743460b1f2e0046c0dc11f84b2a53c0ffb5e9477ee29c72288717b85984a612f0fe89ac6b3244d23c8e3f541e022cc720237f500aaf6ade034c0c8a8dde18cb2cec22bcb2ee0a5745287c886f245bd7c0e207f174504f984aa47784863f9676c0bc006d9c2d6feee0d3cc17aaa5dc3c063c61ef7143e49e23bdcf0de179cd4f4224a50758b885f66f2719af6ac40a00"/511, 0x1ff}]) [ 1149.922144][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1149.946943][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1149.954484][ T5080] loop4: p2 < > 19:16:00 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/511, 0x1ff}]) 19:16:00 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1150.221588][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1150.232134][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1150.239607][ T5080] loop4: p2 < > [ 1150.293283][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1150.303950][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1150.311046][ T5080] loop4: p2 < > [ 1150.366145][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1150.376292][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1150.383065][ T5080] loop4: p2 < > [ 1150.491001][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1150.502542][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1150.510018][ T5080] loop4: p2 < > 19:16:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:03 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:03 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000001300)="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"/511, 0x1ff}]) 19:16:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000", 0x19, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:03 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1152.774731][ T6483] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1152.784224][ T6483] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 19:16:03 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:03 executing program 3: syz_emit_ethernet(0x7e, &(0x7f0000000280)={@broadcast, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @empty, @local, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x34, 0x0, 0x1, 0x0, [{@empty}, {@loopback}, {@private}, {@local}, {}, {@remote}]}, @generic={0x0, 0x5, "b1e203"}, @rr={0x7, 0x3}]}}}}}}}, 0x0) [ 1152.823868][ T6487] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:03 executing program 3: syz_emit_ethernet(0x7e, &(0x7f0000000280)={@broadcast, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @empty, @local, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x34, 0x0, 0x1, 0x0, [{@empty}, {@loopback}, {@private}, {@local}, {}, {@remote}]}, @generic={0x0, 0x5, "b1e203"}, @rr={0x7, 0x3}]}}}}}}}, 0x0) 19:16:03 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) [ 1152.993119][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1153.012148][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1153.022085][ T5080] loop4: p2 < > [ 1153.100107][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1153.110590][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1153.117487][ T5080] loop4: p2 < > [ 1153.189390][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1153.199526][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1153.206373][ T5080] loop4: p2 < > 19:16:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:06 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x0, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:06 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) 19:16:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000", 0x19, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:06 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:06 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x0, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1155.823438][ T6532] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1155.856516][ T6532] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 19:16:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1155.875300][ T6536] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1155.922348][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1155.958478][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 19:16:06 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x0, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1155.976609][ T5080] loop4: p2 < > 19:16:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1156.207044][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1156.217492][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1156.224250][ T5080] loop4: p2 < > 19:16:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:09 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) chmod(&(0x7f0000000400)='./file0\x00', 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xa) socket$inet6(0xa, 0x2, 0x0) 19:16:09 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c0000000", 0x1b, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:09 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1158.848732][ T6578] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1158.872977][ T6578] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1158.886735][ T6583] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1158.929628][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1158.940040][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1158.948470][ T5080] loop4: p2 < > 19:16:09 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1159.148829][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1159.163830][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1159.171014][ T5080] loop4: p2 < > 19:16:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c0000000", 0x1b, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:12 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x47fe5, 0x0) 19:16:12 executing program 3: 19:16:12 executing program 3: 19:16:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:12 executing program 3: 19:16:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1161.930913][ T6634] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:12 executing program 3: 19:16:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1161.986920][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1162.020390][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1162.028005][ T5080] loop4: p2 < > [ 1162.192461][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1162.202615][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1162.209656][ T5080] loop4: p2 < > 19:16:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:15 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:15 executing program 3: 19:16:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:15 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c0000000", 0x1b, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:15 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x47fe5, 0x0) 19:16:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:15 executing program 3: 19:16:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 19:16:15 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:15 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x5451, 0x0) [ 1165.001714][ T6680] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1165.149742][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1165.160428][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1165.167117][ T5080] loop4: p2 < > [ 1165.260120][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1165.270623][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1165.279880][ T5080] loop4: p2 < > 19:16:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000680)) 19:16:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:18 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x47fe5, 0x0) 19:16:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$P9_RWSTAT(r0, 0x0, 0x0) [ 1167.971819][ T6715] netlink: 41643 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1168.086798][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1168.124106][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1168.132049][ T5080] loop4: p2 < > 19:16:18 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept$packet(r1, 0x0, 0x0) getpeername$inet(r2, 0x0, &(0x7f0000000280)) 19:16:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1168.136102][ T6731] netlink: 41643 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:19 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1168.255175][ T6742] netlink: 41643 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, 0x0, 0x0) 19:16:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_GETFLAGS(r2, 0x8912, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 19:16:21 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:21 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, 0x0, 0x0) [ 1171.009622][ T6762] netlink: 41643 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:21 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x14, 0x0, 0x0) 19:16:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, 0x0, 0x0) [ 1171.140194][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1171.171132][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1171.179543][ T6783] netlink: 41643 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:22 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1171.182457][ T5080] loop4: p2 < > [ 1171.258622][ T6793] netlink: 41643 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1171.339113][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1171.349507][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1171.356165][ T5080] loop4: p2 < > 19:16:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:24 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/user\x00') close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 19:16:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:24 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x1046) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, 0x0) tkill(r2, 0x8001004000000016) [ 1174.066657][ T6810] netlink: 41515 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:25 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1174.194159][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1174.212903][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1174.227054][ T5080] loop4: p2 < > [ 1174.244163][ T6828] netlink: 41515 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:25 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1174.362757][ T6837] netlink: 41515 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) 19:16:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:27 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:27 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:27 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) ioctl$EVIOCSFF(r0, 0x5452, &(0x7f0000000040)) 19:16:27 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4$inet(r0, 0x0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write$P9_RREADLINK(r1, 0x0, 0x0) 19:16:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1177.121312][ T6854] netlink: 41515 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:28 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1177.240926][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1177.273573][ T6871] netlink: 41515 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1177.283464][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 19:16:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) [ 1177.294697][ T5080] loop4: p2 < > [ 1177.466347][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1177.476456][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1177.483392][ T5080] loop4: p2 < > 19:16:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r0, 0x2, &(0x7f00000001c0)) 19:16:29 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 19:16:29 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x1, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000026c0), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 19:16:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$P9_RUNLINKAT(r1, 0x0, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000040)='gid_map\x00') tkill(r2, 0x1000000000016) [ 1178.294380][ T6901] netlink: 41515 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:29 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:29 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) [ 1178.383292][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1178.394057][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1178.425772][ T5080] loop4: p2 < > 19:16:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) write$binfmt_elf32(r0, 0x0, 0x0) 19:16:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1178.453786][ T6915] netlink: 41515 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:29 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TCFLSH(r2, 0x4b66, 0x20000000) [ 1178.557793][ T6928] netlink: 41515 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1178.709199][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1178.719365][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1178.726017][ T5080] loop4: p2 < > 19:16:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x1c01) 19:16:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:30 executing program 3: r0 = socket(0x2, 0x3, 0xf9) getsockname(r0, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000040)=0x80) ioctl$sock_SIOCSIFBR(r1, 0x5452, &(0x7f0000000000)=@get={0x1, 0x0}) 19:16:30 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x5451) 19:16:30 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:30 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:30 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 19:16:30 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x14, 0x0, 0x0) 19:16:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x101d0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000002ec0)={'sit0\x00', 0x0}) [ 1179.400244][ T6957] netlink: 41515 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:30 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:30 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5450, 0x0) [ 1179.537870][ T6973] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1179.656913][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1179.668809][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1179.675535][ T5080] loop4: p2 < > [ 1179.729724][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1179.740092][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1179.746933][ T5080] loop4: p2 < > [ 1179.800050][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1179.810610][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1179.817912][ T5080] loop4: p2 < > [ 1179.870867][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1179.881610][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1179.888983][ T5080] loop4: p2 < > 19:16:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, 0x0) sendfile(r1, r0, 0x0, 0x1c01) 19:16:31 executing program 2: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000080)) 19:16:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, r1/1000+30000}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = dup(r0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x20040001) sendmsg$NLBL_MGMT_C_PROTOCOLS(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) 19:16:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:31 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) [ 1180.464419][ T7003] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) dup2(r0, r1) getsockname(r1, 0x0, &(0x7f0000000080)) [ 1180.546374][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1180.573828][ T7018] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1180.582591][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 19:16:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1180.604407][ T5080] loop4: p2 < > 19:16:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101006) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCGETA(r1, 0x5405, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1180.659501][ T7025] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1180.788635][ T7034] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, 0x0) sendfile(r1, r0, 0x0, 0x1c01) 19:16:32 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) 19:16:32 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "b5a59314f015d72265625e89e4f754f15df102"}) 19:16:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:32 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:32 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000380)='./file0\x00', 0x0) dup3(r1, r0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) [ 1181.605091][ T7047] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 19:16:32 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[@mss, @mss, @mss, @mss], 0x4) [ 1181.747062][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1181.769763][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1181.795258][ T5080] loop4: p2 < > 19:16:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, 0x0) sendfile(r1, r0, 0x0, 0x1c01) 19:16:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x1b, 0x0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x24, &(0x7f00000000c0)={'filter\x00', 0x57f77fa}, 0x48) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 19:16:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x8800) 19:16:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:33 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:16:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) dup2(r0, r1) ioctl$VT_DISALLOCATE(r1, 0x5608) 19:16:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:33 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chroot(&(0x7f00000000c0)='./file0\x00') capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000cc0000)) syz_open_dev$ptys(0xc, 0x3, 0x1) 19:16:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1182.866399][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1182.893174][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1182.925367][ T5080] loop4: p2 < > [ 1183.110674][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1183.120819][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1183.128188][ T5080] loop4: p2 < > [ 1183.255574][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1183.265710][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1183.273378][ T5080] loop4: p2 < > 19:16:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(0xffffffffffffffff, r0, 0x0, 0x1c01) 19:16:34 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1bc}}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) 19:16:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) dup2(r0, r1) ioctl$VT_DISALLOCATE(r1, 0x5608) 19:16:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:34 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="90000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$sock_SIOCBRADDBR(r1, 0x541b, &(0x7f0000000000)='ip6gre0\x00') 19:16:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="90000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(0xffffffffffffffff, r0, 0x0, 0x1c01) 19:16:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="90000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1184.001918][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 19:16:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="900000002000", 0x6, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') ioctl$TIOCSCTTY(r0, 0x541b, 0x20000001) 19:16:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(0xffffffffffffffff, r0, 0x0, 0x1c01) [ 1184.047532][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1184.084510][ T5080] loop4: p2 < > 19:16:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 1184.292431][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1184.302867][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1184.309879][ T5080] loop4: p2 < > 19:16:35 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x47fe5, 0x0) 19:16:35 executing program 0: syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1c01) 19:16:35 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5450, 0x0) 19:16:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="900000002000", 0x6, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3da8000, 0x0) dup2(r0, r1) sendmsg$ETHTOOL_MSG_COALESCE_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 19:16:35 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x0) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000001740)='/dev/loop#\x00', 0x6de, 0x842) write$P9_RFSYNC(r0, 0x0, 0x0) 19:16:35 executing program 0: syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1c01) 19:16:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x35, 0x0, &(0x7f0000000080)) 19:16:35 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 19:16:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="900000002000", 0x6, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:35 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) [ 1184.987796][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1184.998260][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1185.004931][ T5080] loop4: p2 < > [ 1185.057200][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1185.068302][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1185.075412][ T5080] loop4: p2 < > 19:16:36 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x47fe5, 0x0) 19:16:36 executing program 0: syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1c01) 19:16:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x10, 0x0, 0x3d8) 19:16:36 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x0) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000080)=0xfef8) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r2, r1) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 19:16:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x2, &(0x7f0000000040)) 19:16:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) r1 = dup(r0) getrandom(&(0x7f0000000180)=""/4109, 0x100d, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, 0x0, 0x0) 19:16:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x0) 19:16:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) syz_open_procfs(0x0, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, 0x0) 19:16:36 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) [ 1185.785812][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1185.796080][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1185.803064][ T5080] loop4: p2 < > 19:16:37 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x47fe5, 0x0) 19:16:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x0) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x0) 19:16:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:37 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x2, 0x0) write$P9_RLERRORu(r0, 0x0, 0x0) 19:16:37 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 19:16:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:37 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0x1) 19:16:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[], 0xd0}}, 0x0) 19:16:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000080)) sendfile(r1, r0, 0x0, 0x0) [ 1186.466421][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1186.504430][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 19:16:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:37 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') readlinkat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/113, 0x71) [ 1186.524511][ T5080] loop4: p2 < > 19:16:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x47fe5, 0x0) 19:16:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r1, &(0x7f00000003c0)={0x0, 0x1e0, &(0x7f0000000380)={0x0}}, 0x0) 19:16:37 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x5421, &(0x7f0000000180)=""/224) 19:16:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0000e2ffff0acaffffff0000e1ffffff0200"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) 19:16:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x47fe5, 0x0) 19:16:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) fcntl$setown(r2, 0x8, 0x0) 19:16:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0x5450, 0x0) 19:16:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad00", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x47fe5, 0x0) 19:16:38 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_subtree(r0, 0x0, 0x0) 19:16:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad00", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:38 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) 19:16:38 executing program 2: r0 = socket$inet6(0xa, 0x10000000000001, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 19:16:38 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_subtree(r0, 0x0, 0x0) 19:16:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:38 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x47fe5, 0x0) 19:16:38 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000000c0)) 19:16:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad00", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:38 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000140)={0x0, 0xfffffffffffffc6a, &(0x7f0000000080)={0x0, 0xfffffee9}}, 0x0) 19:16:38 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x47fe5, 0x0) 19:16:38 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 19:16:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20}, 0x10) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 19:16:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad0000", 0x4, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:38 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x47fe5, 0x0) 19:16:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) close(r1) socket$inet(0x10, 0x2, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 19:16:38 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000), 0x10) 19:16:38 executing program 2: r0 = eventfd2(0x0, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$netlink(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xc) 19:16:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad0000", 0x4, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:38 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:38 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000001500)='/proc/self\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001980)={0xffffffffffffffff}) dup2(r1, r0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[], 0xa8}}, 0x0) [ 1187.850366][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 19:16:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) write$9p(r2, 0x0, 0x0) write$nbd(r2, 0x0, 0x0) 19:16:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad0000", 0x4, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:38 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup3(r1, r0, 0x0) ioctl$KDDELIO(r0, 0x541b, 0x20400000) [ 1187.895595][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1187.931016][ T5080] loop4: p2 < > 19:16:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={0x0}}, 0x24000000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 19:16:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$netlink(r2, &(0x7f0000002800)={0x0, 0x0, 0x0}, 0x0) 19:16:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:38 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) dup2(r1, r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 19:16:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:38 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$getownex(r0, 0x10, &(0x7f0000000440)={0x0, 0x0}) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/user\x00') [ 1188.255085][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1188.266350][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1188.274068][ T5080] loop4: p2 < > [ 1188.379812][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1188.391561][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1188.399687][ T5080] loop4: p2 < > [ 1188.486262][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1188.497878][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1188.504555][ T5080] loop4: p2 < > [ 1188.626194][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1188.636907][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1188.643762][ T5080] loop4: p2 < > 19:16:39 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x29, 0x18, 0x0, 0x54) 19:16:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:39 executing program 2: sched_setscheduler(0x0, 0x5, &(0x7f0000000080)) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) 19:16:39 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$getownex(r0, 0x10, &(0x7f0000000440)={0x0, 0x0}) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/user\x00') [ 1188.730979][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1188.743379][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1188.750280][ T5080] loop4: p2 < > 19:16:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) tkill(r1, 0x1000000000016) 19:16:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGSID(r2, 0x802c542a, &(0x7f00000000c0)) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000240)={0x0, 0x0, 0x6, 0x200, 0x1, "90e04af5b1d6c199"}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x802c542a, &(0x7f00000000c0)=0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x8840) syz_open_procfs(r3, &(0x7f0000000000)='attr/exec\x00') 19:16:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1189.171351][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1189.181696][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1189.189274][ T5080] loop4: p2 < > 19:16:40 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd100008800c0007800800094077ca41870900020073797a3000000000080009"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:40 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 19:16:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x5450, r1) 19:16:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000080)=0x20) 19:16:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGSID(r2, 0x802c542a, &(0x7f00000000c0)) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000240)={0x0, 0x0, 0x6, 0x200, 0x1, "90e04af5b1d6c199"}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180), 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x802c542a, &(0x7f00000000c0)=0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x8840) syz_open_procfs(r3, &(0x7f0000000000)='attr/exec\x00') 19:16:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x800, 0x0, 0x0) 19:16:40 executing program 2: r0 = epoll_create(0x7) close(r0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$P9_RRENAMEAT(r0, 0x0, 0x0) 19:16:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xc9e10) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000440)) 19:16:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x800, 0x0, 0x0) 19:16:40 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:40 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}}, 0x0) [ 1190.032674][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1190.042854][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1190.050059][ T5080] loop4: p2 < > [ 1190.149406][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1190.163403][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1190.170532][ T5080] loop4: p2 < > 19:16:41 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x800, 0x0, 0x0) 19:16:41 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = dup2(r0, r0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)}, 0x20000080) 19:16:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890c, &(0x7f0000000000)={'wg0\x00'}) 19:16:41 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x0, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, @random="e004b417e621"}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x890b, &(0x7f0000000000)={0x6, 'veth0_to_hsr\x00'}) 19:16:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x540b, 0x0) [ 1190.506895][ T7624] device lo entered promiscuous mode [ 1190.546566][ T7620] device lo left promiscuous mode 19:16:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000004880)={&(0x7f00000041c0)=@in={0x2, 0x4a23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0x0) 19:16:41 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:41 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 1190.561315][ T7631] device lo entered promiscuous mode [ 1190.575109][ T7620] device lo left promiscuous mode 19:16:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x800, 0x0, 0x0) 19:16:41 executing program 3: r0 = socket(0x2, 0x1, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x4f040) [ 1190.711180][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1190.746041][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1190.754527][ T5080] loop4: p2 < > [ 1190.879193][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1190.889601][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1190.896319][ T5080] loop4: p2 < > [ 1190.991533][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1191.001772][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1191.009989][ T5080] loop4: p2 < > 19:16:42 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "980df244a3de374e"}) 19:16:42 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 19:16:42 executing program 3: r0 = inotify_init1(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r1, r0, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000000), 0x4) 19:16:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x800, 0x0, 0x0) 19:16:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x800, 0x0, 0x0) 19:16:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 19:16:42 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) 19:16:42 executing program 2: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, r1/1000+30000}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r3 = dup(r0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 19:16:42 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1191.448485][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1191.476438][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1191.494034][ T5080] loop4: p2 < > 19:16:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) 19:16:42 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 19:16:42 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x5451, 0x0) 19:16:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) 19:16:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x21, 0x0, &(0x7f0000000340)) 19:16:42 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:43 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) 19:16:43 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setown(r0, 0x8, 0x0) 19:16:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000740)) 19:16:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000002240)='/dev/vcsa#\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) 19:16:43 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:43 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x402, 0x0) [ 1192.394429][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1192.442494][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1192.451643][ T5080] loop4: p2 < > [ 1192.634251][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1192.644560][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1192.651804][ T5080] loop4: p2 < > 19:16:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_tcp_buf(r1, 0x6, 0x3, &(0x7f0000000040)="9d96d5af", 0x4) 19:16:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) write$P9_RWSTAT(r1, &(0x7f0000000180)={0x7}, 0x301) r2 = accept$inet(r0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 19:16:43 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:43 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000100)) 19:16:43 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000000)=""/11, 0x7103) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 19:16:43 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:43 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000000)={0x6, 'gre0\x00'}) [ 1193.064439][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1193.080939][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:16:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = dup(r0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000340)=0xf04) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f00000001c0)) 19:16:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=@ethtool_ringparam={0x0, 0x0, 0xfffffffc}}) 19:16:43 executing program 3: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) close(r0) socket$packet(0x11, 0x2, 0x300) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 19:16:44 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 19:16:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) dup2(r0, r1) getsockopt$inet6_int(r1, 0x29, 0x48, 0x0, &(0x7f0000000080)) 19:16:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$packet(0x11, 0x2, 0x300) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @local}, 0x10) [ 1193.337509][ T7795] device lo entered promiscuous mode [ 1193.350802][ T7792] device lo left promiscuous mode [ 1193.361015][ T7796] device lo entered promiscuous mode [ 1193.372513][ T7792] device lo left promiscuous mode [ 1193.420148][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1193.441913][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1193.449847][ T5080] loop4: p2 < > [ 1193.576216][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1193.588311][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1193.595657][ T5080] loop4: p2 < > 19:16:44 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffffffffffffffd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000000)={0x14}, 0x14) 19:16:44 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:44 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x29, 0x12, 0x0, 0x300) 19:16:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000380)=0x404100000001, 0xfe3f) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = socket(0x2, 0x80001, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132441) connect$unix(r2, &(0x7f00000000c0)=@abs, 0x6e) write$P9_RSTATFS(r2, 0x0, 0x0) 19:16:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$DEVLINK_CMD_TRAP_GET(r1, &(0x7f0000000080)={0x0, 0x5b, &(0x7f0000000000)={0x0, 0x38}}, 0x24048054) 19:16:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname(r1, &(0x7f0000001e40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000001ec0)=0x80) dup3(r0, r2, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname(r3, &(0x7f0000001e40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000001ec0)=0x80) getsockname(r4, &(0x7f0000001e40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000001ec0)=0x4f3) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000001c0)={'sit0\x00'}) 19:16:44 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0x5450, 0x0) 19:16:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:44 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x10000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$inet6(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 19:16:44 executing program 0: 19:16:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x5427, 0x0) [ 1194.117665][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1194.132705][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 19:16:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x60010005, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$P9_RSYMLINK(r0, 0x0, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') tkill(r1, 0x1000000000016) [ 1194.158205][ T5080] loop4: p2 < > [ 1194.308096][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1194.318922][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1194.325720][ T5080] loop4: p2 < > 19:16:45 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f00000000c0)=0x80) close(r1) socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000500)={0x0, 0xfffffcb7, &(0x7f00000004c0)={0x0}}, 0x0) 19:16:45 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x40100000001, 0x4) r1 = dup2(r0, r0) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 19:16:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x1, &(0x7f0000000300)=@dstopts={0x2}, 0x8) 19:16:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:45 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 19:16:45 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = semget$private(0x0, 0x5, 0x0) semtimedop(r1, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:45 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180), 0x8) 19:16:45 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) [ 1195.059650][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1195.103311][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1195.118173][ T5080] loop4: p2 < > [ 1195.245776][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1195.255828][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1195.262720][ T5080] loop4: p2 < > [ 1195.387766][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1195.397937][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1195.405071][ T5080] loop4: p2 < > 19:16:46 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)) 19:16:46 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = semget$private(0x0, 0x5, 0x0) semtimedop(r1, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:46 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$TIOCSPGRP(r3, 0x5410, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 19:16:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:46 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = semget$private(0x0, 0x5, 0x0) semtimedop(r1, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:46 executing program 3: r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) writev(r0, &(0x7f0000001240)=[{&(0x7f0000000100)="bfaa76cdc292dddc5edefa68d37473993aef7e05d326e46d99999cab11ba94e05cfd33cdd22854fe2e7b4f44289f4ced72838448d04f3a05538a66e8db52eab4c683b828b740fcabc23c1c339f1a2280149014c78ff5ecc1c18f9508fa7124b59d775069cd5c540b9f7910309a9c7ce80b94c03e71e916f7a8a7ec46fd2c8ab69db63f35ab3df0c37c476e7cfce84c614efc95359b181fc1d9b4edc1056716b15854d40fe0babd2985f9b633b7372633f0809aff76c713864124c053c445", 0x80000000}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f0000000000)="6726c5e4469ffb1aa969f41d3a857eaf8c517017efa2d47a26734014c4a55313c600e3283805", 0x26}, {&(0x7f0000000040)="d0935d8fae76962391d549896da567fc0ede183c99425e90d8782b7c8d3f14256b8e3827"}, {&(0x7f00000011c0)="74502efdb6986dd100b59068d347afe9c56bee52f0f8065cf13b50fd8978f72a52c25aa27ca18448fbc84bb1d744f16401a199d5d6066904ab3dfef235b91643bbe09cc3e80a0aa297d0525251e7193f76ed47d5624ff3213cc90f4ca60832d44f634f514308ad", 0x67}], 0x5) 19:16:46 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:46 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = semget$private(0x0, 0x5, 0x0) semtimedop(r1, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) [ 1195.862589][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1195.911617][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1195.921444][ T5080] loop4: p2 < > [ 1196.113768][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1196.124187][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1196.131353][ T5080] loop4: p2 < > 19:16:47 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) close(r1) socket$inet(0x2, 0xa, 0x0) tkill(r2, 0x1000000000016) 19:16:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:47 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:47 executing program 3: r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) writev(r0, &(0x7f0000001240)=[{&(0x7f0000000100)="bfaa76cdc292dddc5edefa68d37473993aef7e05d326e46d99999cab11ba94e05cfd33cdd22854fe2e7b4f44289f4ced72838448d04f3a05538a66e8db52eab4c683b828b740fcabc23c1c339f1a2280149014c78ff5ecc1c18f9508fa7124b59d775069cd5c540b9f7910309a9c7ce80b94c03e71e916f7a8a7ec46fd2c8ab69db63f35ab3df0c37c476e7cfce84c614efc95359b181fc1d9b4edc1056716b15854d40fe0babd2985f9b633b7372633f0809aff76c713864124c053c445", 0x80000000}, {&(0x7f00000001c0)="f5daf7dd0640a25d454b00d8704eb186e03cafb7b547eb931fb79e2218a9a130e8e859802576b27a09494e1d1e01a8a8b7edf321053184278f77754f04a551fb6ec678ddd370de3f8936c43f95cb35d5cf82095eef4aa952272661793e93864a1597486237194c5513d9092da283c46b3e9dfbf2130c000a4efc8f4dbb538ee6b37d53a118ee2208cc80075bca720201f3bfdc8029d418307f74f059aeaf75ab7518f344d89bfcbce8a24c8cedf93c61d7d5458d4e51b47704a2d96798e88ae89ab4a76403d8ff921363a81d3f60639845ac852efad7ca1aad1adf13f5855bac7aa21589edaf04894843a9c901c62e673afb0d9f978f9104536a5f7999fd7b55720059d03043bc2996d0f642e3e3abbb91a091244deed859afa907223ec49f169863e0f67673ac0df354dbf90cf8ed289fd44dc54b943af4cd523e4562d8e1501ef48b094c2f6b4f963d489e39e03a790b3a450afff6dd04f3baa4618e55734d24c7ffe2a36eaedd61143e572cd8672564d4ea4eec91022ae56e622697dbf81c6b6649d6d4d5935657a09543b1de205998615da96a5e66f44e41bcd9658831ac78c1826e5d0632f72ae84865cc47e9642a7beb1a284635955994b307a1ce553994a5a76de24c7f30c749ca79b3865b0e6ce285f69e082b89f8fc3efa08f326e7516e63c52aa5990637e1b93a36759aebc142310b75af70941e5110051d0d65a8776a95aa1b7f9b25c492db499090a62242b9fe865be6e17369cb7c3332a65ff3290d9d7970ae3dd4eee44420420079fcf1c669480d28cb00cb1dd9d4af40af244ed3c4cd5f4a0a020754936306b59d276a18fa6c43279e1d86a0efbab1b8cb2f5303174c4ba253224ff39214af40dc538ad47eb42a8f01cd95ff375600cd084f0dbe540fc59e0b0c73348c80273f83af095e874f0759fd22cdccef9ae903d98e1f103e3119499ef02b138051a49a5d002f822072b907595a1e8c6186f85292fefb72de2334749c486f62c1568a663a93d79097bb7ae257ce2c579686cd426d0f8cc0849de5c011f80aff57086c0af51aa62dee8d9943d5197b273a67e9ac211003b4860aa6716c59366adefefe596f3d7dbcf7e4fcd0f79fc79ef974321b7941d7e91d015e5a79f4d611e9bb94963fa59faf3c97503ac9ebeecdf83aa69dadf39e074f57f712b2134474e6db9bdea7e9205c725c5cf14f5e6d67cd2c60810b0f27c4e92aafff5135ee7ce3d29d5d745ccfe427643b23fb02cc5716d1d94f5675b76bcaf527d79cf42270f9444fedf6a8245b839fa40093d85fb279ee580990a2a49468d37e72a9935f166b297b237ce5c9641b3e27f64d91aad0740fa718e882c82e65c3e067e4ba6f5ce38e5e6078f6d3e5c1cab4379f81b7d18958328282a5fa20666c900d38ae6ec29a4764ed9b0570ea69effb4bb56039c6d9bc919eb76edc299c4c94cc3b0001c38c06afd2104b8befcfae51db07c6eeea717fcd549304e3252ad9317b00bfe89118adfb8e29e6235ce0bb0a8ae472f0150cf1afbb7d91130374673de94100cca8082faf41896e36d013c50768a6d065547a03e901861f54b6078edbf71614f048b05ebd06a44dc8264a44119173ba006ab01679fd509d6a6d5d981378f8e9e7117758d2524b483b21b4d81ef2d86711fb45a984fe12447be828e3eaaf039a2cf21580a4f531fabb9f00acfb1d8f2f344ed01ce14652cfe8e0b166e07a199c853de42450836c725647e39052e23579b9a6b3e35c67b086b527f58769bf4313b64351b098b6328c04816f6dc68d2f067b5d5c844a3e7cba16af1b83389a3ce173ba177d56ef9ee6f0fc9b5553ed27598d634a855941d10cbe69120323ed247628af40fbe507e86b947ae0a4bb884a2c177e17e5ef689db5a6a8f9c57c1c82ee72471d79fba4d623be02910eab1203bd28060ff1dbd0518d23bcdbb93773c1dd3b4353795d583f04dc4b9a035ed397ddb2eabde37936477c37e527a89f8b8549cce92545acb8a3f04da704add3dd64e6b7df4b1df68046e9508b78abead1061cdcf7d7e1872ce833a1ee4584d4390d7001fa1f7502af0558bfa4cab0ac4d527dac17216e7a55a322b31045ec8adb7de6f39c0fbe73a6f824de213d0b67efd658eab2eb02d1520fd4e139c79a88fc98a3c53032aaba2859d7216d55eedf6f218f1ce686d8a7c623451f32ed427a852be7b1e7c9bf963e71671556bf7cbd38a796b570f1a8e5d238a4f27f34c73ac36fdb48b108737e68ade28bfae771b1f437b8efb2c67cd28a6d0ea01097f511317cbcb44b04af17b312b24d5b4e25dbe7130480b50dbec3eb1cdd7cf36b2c953f39afc7adc320cdf15c22290725cb7f5e937f6fca97b871a31c6bd817a1323283fd765ed8dbd4012949b7f4c10e429715de308ebf0efb5e7fef7dba63507f1491a16b7157fbc0e20e4c3ce9a87c207ceb4dfeb9b259dc7ca6fdce7e09e9dc411f0753e75c2d9b6ccaf30e9011a8596582c564f76bf5e210beef344592f95cfe3f57e854305c6f01e4968bbd091db1498b97c596dab0d6a0eb231476221a510c6f9e55deed03681ffa950c26d099cebd9321b125960b194302b1c8aff8e6125ef2b2613d68544d109558edcce7069d867ed6251f9962a029b1f4b264fb67adfee1fbb3164c3610ba4f4484bdbb93cf8f4e13ef76ccc95a9eb59903aee9b0a2130240a068ca3a670095f8da478ff68f1ab9b5625f08a9a927b55cf09d0aabe154c98babfe87b086200e59c314d2dd1d4fb5726fbe7c51d779d74d08ba85d0ba559ad206379eb1eacbb00c133a951d88f3d56eddafc5d059192112288883abdaf413c800e87795d213c42235b4a6b28967c769d33c0da2d95410bb41b595be7c36c9697d444389eb6357a840bfbe3ee42d045c33e02b11e39ce9183879028ef1eb57fc99c0b550b286a644e2b940d2c69e5eed4b6dff5c7dbec21d491c6bbc23aa3a7a154d34547ec03b2790e9ec034d01354b9d14286b26a01f69392693828e9a1f219c5551441dc98289151fb9ea471d207117999d24ddd7de9463b6abfe0d55bb35c4d7408c5f990f1daf596e666edbba98f61159731f393839ea597b5631528995fd14687b2711d598e8eb847b5dd58b817a5dc40383108e1cf9d3acc8ee4fcb7127bac22b688a8c8a9a6309ababa1689f53bb445d75d6e88d8906a5c2b2c72c85358a72e69e4a75433b2fad4f2a39889337cb7f2f06762f2ffb4c55d9e50c643ec7ac18e2a3039dc8af02c4d7569115f9f83d533ee86b52d462a3103e5275cf70cd8bdcecf3f1e82601e0f5230adc3855b64b1992cd598474c3eca31c14e6a5b1d5a79b9bc948b2d1ad5ac5c521a6709f71814317643db0706c22e349028d581e9fcd70986c0b36ab27434345cb1a31e4b7770528e509ed9700373a0af7b7bc754f059d0543d86cebba335079bca1766d5a5be35acf624bd8cca74080c5618d1bd65f66a783b5912606d26019ddb029afb5977708a5d90587fce45332793fd03f97c694d5bed25412dab4677c583c63bbe7f3831dc91e2390388314abbeaee109071df6ab5e0acec2d419fd35dc6c7c8fe53d331b0d54a766e046db8ea3f3c53391be7b054f15cff244ce2973289a7fd3fc44fdef5b7a50a68234d37e2cf1641b3097ee3d0a9877650ef7c1983128e3ac20935b3505150311af858ccf181ea5393e2de1eca6917cb9286a9e2c84db4f79eee24a75efd903f386421942fcea0fede3b50a2e7abce5f02f2b61c77607ea8cffcade533456236f2429d235312217caa46dc7b8af8b4ecf50410a01a955a407e34f611ac406f5b60826ef7323f71b8cbb8faf621a0a89dbc1b9ab8e82fbac2a2ffeca8d47a31fcb4d9a54efb3fdd1c50406dc95d227631ba7b6ce9b4f9ab0e8d934eb71ac9d67b8c985b375d114722893277fe3b7d93cd3eaa7ea82867847d81b619115e49644b91c506f2e8866017aa34db95b2de3ec8f5265c138642f75409156c2fe16dd32c8c6f09718c3f40ca68ebf6f6679e805ea098bdf7f1f9491b7d775f46313f226016cb4b9735f5eae19379379fa807a593f415cd4b609a0b1dd04bd5de862d5c178067e448439e81a172506c5ed788da1b2f64a196fd311e4072b37f3f29acc9047944069b43c4677b817dbb6d2451d7d254f194cdd126978ce16bd009511330011bcf45e1ee74f0779af7fea2b6376d7a210ceeb101993968d0dfea6149fcb7bf6fea502ae1bdb194bf79f9737997e4e460f91df200ae5e1893c0a2fc19ebfbf6353e1c1c6520b10ffed763a2f49198921eb19fe6f164881cc8376814e4502b2087b2a28afe314941d38810815cb76bd4a8b7d694ddeb115b6121b565e35336ae973a5973b78356e0d06252b81d16bf00c7d2d6cf05526aff39a11dd39859d783d6e1e379d2d019e99d5cd21526ee2b5fb1a69e996e0dced93576aaf874e27e13a861ceb78aaced4439b80c3adfd31c8054630f16c1fb8bc175b23f52068c83323e6c9c84561372d149e1974fd8b11329f3e55d99bdc20f2984b7311bbe8492e2caadbe964fbb8a3b6fcf8aaa6268eed287c5a20e2fa37c8f65cf9f4d904666a5ee42a10e7fb29817a42182d20d084bbab225f6c79b506671915d6f3cb8ebced726fe1c6104221af86f704c2de4dec8f10a45de26a1cf712f34f4f91fe353ecf9148db8d226632d43c5b32d89c59cfde73c226b8abaa8f3ec41c020f4fb8ea410ae4e06c1c4ab0771abdeeb02886984e119f4240e7d5281e4742f296d71e3823b99230a23e04c74e421b19f49513c17062e558a0be1675d9b9fa66e305e9b29bd14b8a9872fce15791e110c6dc6a3bb6339f475550a7200e65995e7eda8b30fa8ff6de49b5602b5e4ad6cb896f096db33dafc649e8daf2ef048a937d88f0b1139f53f8c939fa8b39292bc46d9136418970897f92f205ad95a77359e00c7ce806f4a6c0df59ca144eeefd21e66c66a61860a9fe9ae4f8df30acb1360bc7ed61cb50eb8c13a8bf2cbe7ff4cca838e90be23c8cbcbed97abaf0c644f799d4124dfe4b04027ccab92371c272397af4750de1e05f33eca6b6fdbfe23b02467867d4c6dc19c5d4d486c3da3664b33aa8ce0730509bc40076022c3ab324edb04fe745fba2f3600893f2e5280cbe7d21e0f1a85a0fd390a0b9868693d1b99d683a97c5caeb8c0d0883d2ab92113b037bae7ca6fd274eb5d77723129869ad376ffb10d4242ad93782ce86162e158ac5df50457b3c77bc63ce9edc101ff85bb4050e0c81ab225be66477e9798bc4d2abe6ec6aa5ad2d093d8ea915e81f9094db4bbcb8187b0f8d74f73dc1d9f031273707de3e44ee4c25982cfe11862baa11f3424f359acaff2a7244fb1c25f4cfc6253496d91f000aa5c427f0c9b2c509f30688918118378c187520ba911e71ecbeee9ec06300767aa624e47702821acdbb67137f5bdf6bc50a6f1ae7cf377702fa682216fc2380e83c853e89daedddf00d587fc865bb7aa03262d54398b1b332b8e7ccfe3c7756a000d6ca248a05d9775c4f7b561fc039a2ea60b307eb5bc3ef04923ac20a75398c1245b8b2121170af144b533499beb1e108bbd222289b2d56585d60f6935ee6c46d191e57f6a45d7007219dfe886835cfa85fa1d3652a533a12504918d07de4907bfba47becc232862ab5b1cf9e0677f8b7a2af8b8a6d7900a15ab7b5f76f4b1b56e3c59f5ed03e898fa611920e38d4e42b6e4e8d2970d002769b624cbce9d779c5735a1eee0b2a7e6343ae2448ecbf53036efe217b02dcf1cd6097bfd20a88c00c", 0x1000}, {&(0x7f0000000000)="6726c5e4469ffb1aa969f41d3a857eaf8c517017efa2d47a26734014c4a55313c600e3283805", 0x26}, {&(0x7f0000000040)="d0935d8fae76962391d549896da567fc0ede183c99425e90d8782b7c8d3f14256b8e3827"}, {&(0x7f00000011c0)="74502efdb6986dd100b59068d347afe9c56bee52f0f8065cf13b50fd8978f72a52c25aa27ca18448fbc84bb1d744f16401a199d5d6066904ab3dfef235b91643bbe09cc3e80a0aa297d0525251e7193f76ed47d5624ff3213cc90f4ca60832d44f634f514308ad", 0x67}], 0x5) 19:16:47 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:47 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1196.646626][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1196.681475][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1196.689636][ T5080] loop4: p2 < > 19:16:47 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:47 executing program 0: r0 = inotify_init1(0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 19:16:47 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) [ 1196.939655][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1196.950063][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1196.956912][ T5080] loop4: p2 < > [ 1197.074906][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1197.085680][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1197.094028][ T5080] loop4: p2 < > [ 1197.217093][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1197.228092][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1197.234750][ T5080] loop4: p2 < > 19:16:48 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:48 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) syz_open_procfs(0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 19:16:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:48 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x5450, 0x0) 19:16:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) close(r0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) tkill(r2, 0x1000000000016) 19:16:48 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:48 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:48 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) [ 1197.795416][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1197.805894][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1197.813704][ T5080] loop4: p2 < > [ 1197.865591][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1197.876770][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1197.884237][ T5080] loop4: p2 < > [ 1197.972744][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1197.984057][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1197.991936][ T5080] loop4: p2 < > 19:16:49 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x8040) 19:16:49 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:49 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000002780)='cubic\x00', 0x6) 19:16:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) 19:16:49 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000084c0)={0x0, 0x0, &(0x7f0000008480)={0x0}}, 0x0) 19:16:49 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:49 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x2, 0x0) getpeername(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x80) dup2(r0, r2) getsockname$packet(r2, 0x0, &(0x7f0000000480)) 19:16:49 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0x2}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 19:16:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) [ 1198.672449][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1198.684444][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1198.693123][ T5080] loop4: p2 < > [ 1198.747477][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1198.759594][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1198.768261][ T5080] loop4: p2 < > 19:16:49 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:49 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:49 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = socket(0x1, 0x5, 0x0) dup3(r1, r0, 0x0) writev(r0, 0x0, 0x0) 19:16:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:49 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 19:16:49 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000004b00)='/dev/input/event#\x00', 0x0, 0x0) dup2(r1, r0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000140)=""/157) 19:16:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) [ 1199.213472][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 19:16:50 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:50 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x13, 0x0, &(0x7f0000000040)) 19:16:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0xfffffda1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockname(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x1de) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) [ 1199.260184][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1199.282695][ T5080] loop4: p2 < > 19:16:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:50 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:50 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001940)={&(0x7f0000000000), 0xc, &(0x7f0000001900)={0x0}}, 0x0) 19:16:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) shutdown(r2, 0x0) 19:16:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:50 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) getrandom(&(0x7f0000000080)=""/4121, 0x1019, 0x0) ioctl$TIOCCONS(r1, 0x541d) 19:16:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x4000) 19:16:50 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x40, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) [ 1200.267280][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1200.300736][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1200.308813][ T5080] loop4: p2 < > 19:16:51 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:51 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/user\x00') close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000021c0)={0x0}}, 0x0) 19:16:51 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x181282) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 19:16:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:51 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x21, 0x0, &(0x7f0000000440)) 19:16:51 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl(r0, 0x2, &(0x7f0000000900)) 19:16:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) 19:16:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000001fc0)='./file0\x00', 0x40, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'caif0\x00', 0x803}) r1 = socket$nl_generic(0x2, 0x2, 0x88) getsockname$netlink(r1, &(0x7f0000000000), &(0x7f0000000040)=0xc) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x8953, &(0x7f0000000000)) 19:16:51 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x745000) [ 1201.192751][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1201.202907][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1201.210134][ T5080] loop4: p2 < > [ 1201.300455][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1201.310581][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1201.318022][ T5080] loop4: p2 < > [ 1201.411599][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1201.421713][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1201.429029][ T5080] loop4: p2 < > 19:16:52 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:52 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) close(r0) memfd_create(&(0x7f00000001c0)='cpuseteth1\x00', 0x2) fcntl$addseals(r0, 0x409, 0x0) 19:16:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0xc014) 19:16:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x40, 0x0, 0x0) 19:16:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$CHAR_RAW_ALIGNOFF(r1, 0x127a, 0x0) 19:16:52 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x40, 0x0, 0x0) 19:16:52 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) close(r0) r1 = socket$inet(0x2, 0x4020000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) connect$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 19:16:52 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) 19:16:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1201.843581][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1201.853730][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1201.862492][ T5080] loop4: p2 < > 19:16:52 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 19:16:53 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x40, 0x0, 0x0) 19:16:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) ioctl$EVIOCGUNIQ(r1, 0x5451, 0x0) 19:16:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ttyS3\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 19:16:53 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40) [ 1202.702007][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1202.713266][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1202.720951][ T5080] loop4: p2 < > [ 1202.847704][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1202.857745][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1202.864704][ T5080] loop4: p2 < > 19:16:55 executing program 2: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$inet6(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x0) 19:16:55 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:55 executing program 3: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000001440)={0xa, 0x0, 0x0, @empty}, 0x1c) 19:16:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept$inet6(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) 19:16:55 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd1000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:55 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) dup2(r0, r1) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x13, 0x0, &(0x7f0000000000)) 19:16:55 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZEX(r0, 0x4b60, 0x0) [ 1204.988382][ T8357] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.5'. 19:16:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xffffff9f}}, 0x0) 19:16:55 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1205.027868][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:16:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[], 0x6c1) r2 = dup(r0) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 19:16:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, 0x0) [ 1205.090252][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1205.123938][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1205.149904][ T5080] loop4: p2 < > 19:16:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) dup2(r2, r0) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1205.319106][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1205.329866][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1205.336703][ T5080] loop4: p2 < > [ 1205.445838][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1205.456460][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1205.463901][ T5080] loop4: p2 < > [ 1205.750875][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:16:58 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:16:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) ioctl$TCSETSF2(r0, 0x402c542d, 0x0) 19:16:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, 0x0) semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:58 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd1000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:16:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000f149038a00"}) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) getrandom(&(0x7f0000000180)=""/4109, 0x100d, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) 19:16:58 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x2, 0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/attr/current\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x0) [ 1208.024428][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1208.056716][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 19:16:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$sock(r1, &(0x7f0000000100)={&(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "752a0e1e49c4e9c32a10f95632f32203974d18cc623dbbc05b0ae1cff1f085a89f843a794759328d1c54f1134cdbfca1ecc03db4dc439d2de573ff64b28452"}, 0x80, 0x0}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket(0x2, 0xa, 0x0) tkill(r2, 0x1000000000016) 19:16:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, 0x0) semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:16:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) fchown(r0, 0x0, 0x0) 19:16:58 executing program 3: r0 = socket(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000084, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40) [ 1208.076649][ T5080] loop4: p2 < > [ 1208.091789][ T8429] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.5'. 19:16:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) dup3(r0, r1, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 19:16:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, 0x0) semctl$GETVAL(0x0, 0x2, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1208.386014][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1208.396430][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1208.404142][ T5080] loop4: p2 < > [ 1208.459989][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1208.470514][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1208.477887][ T5080] loop4: p2 < > [ 1208.531778][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1208.542337][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1208.549636][ T5080] loop4: p2 < > [ 1208.601692][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1208.612764][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1208.619998][ T5080] loop4: p2 < > 19:17:01 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x5}, {}], 0x2, 0x0) 19:17:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x1b5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4$packet(r0, 0x0, 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 19:17:01 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 19:17:01 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x0, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:17:01 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000906178108deffec8fd62be8fe00060105000100060000fd1000"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x47fe5, 0x0) 19:17:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000b00)='/dev/loop#\x00', 0x0, 0x0) close(r0) socket(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 1211.110531][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1211.133696][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:17:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000380)=0x80) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) dup2(r2, r1) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r4 = ioctl$TUNGETDEVNETNS(r3, 0x5450, 0x0) pwritev(r4, 0x0, 0x0, 0x0, 0x0) 19:17:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000140)={0x2, 'ipvlan1\x00'}) 19:17:01 executing program 3: r0 = socket$nl_generic(0xa, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x61, &(0x7f00000001c0)={&(0x7f00000003c0)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) [ 1211.153355][ T5080] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1211.165951][ T8491] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1211.201586][ T5080] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1211.209305][ T5080] loop4: p2 < > [ 1211.241682][ T5059] ================================================================== 19:17:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x83ce, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x90, 0x8}, 0x380d, 0x6, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x19) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x11f176197f3eb739) keyctl$assume_authority(0x10, r1) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x41, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100101, 0x0, @perf_bp={0x0, 0xa}, 0x4f000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x33e}, 0x0, 0xffffffffeffffffe, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000006c0)='net/netstat\x00') semctl$GETVAL(0x0, 0x0, 0xc, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f00000000c0)) read$alg(0xffffffffffffffff, &(0x7f0000000340)=""/169, 0xa9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_CPUID(0x1011) 19:17:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000002240)='/dev/vcsa#\x00', 0x1000, 0x0) dup2(r0, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x17, 0x0, 0x0) [ 1211.249800][ T5059] BUG: KCSAN: data-race in __fsnotify_parent / select_collect [ 1211.257404][ T5059] [ 1211.259759][ T5059] write to 0xffff8880b29d4780 of 4 bytes by task 8298 on cpu 0: [ 1211.267390][ T5059] select_collect+0xaf/0x2b0 [ 1211.271983][ T5059] d_walk+0x285/0x4d0 [ 1211.275953][ T5059] shrink_dcache_parent+0x85/0x3f0 [ 1211.281052][ T5059] d_invalidate+0x6e/0x1a0 [ 1211.285464][ T5059] proc_invalidate_siblings_dcache+0x1e3/0x2d0 [ 1211.291713][ T5059] proc_flush_pid+0x16/0x20 [ 1211.296217][ T5059] release_task+0xa9f/0xb90 19:17:02 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) close(r0) openat$null(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/null\x00', 0x1, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) [ 1211.300708][ T5059] wait_consider_task+0x104f/0x18c0 [ 1211.305892][ T5059] do_wait+0x1b1/0x4d0 [ 1211.310125][ T5059] kernel_wait4+0x13c/0x1a0 [ 1211.314904][ T5059] __x64_sys_wait4+0x7a/0x100 [ 1211.319682][ T5059] do_syscall_64+0x39/0x80 [ 1211.324120][ T5059] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1211.330131][ T5059] [ 1211.332480][ T5059] read to 0xffff8880b29d4780 of 4 bytes by task 5059 on cpu 1: [ 1211.340017][ T5059] __fsnotify_parent+0x79/0x470 [ 1211.344858][ T5059] fsnotify_perm+0x292/0x2d0 [ 1211.349447][ T5059] security_file_permission+0x87/0xa0 [ 1211.349457][ T5059] rw_verify_area+0x12c/0x240 [ 1211.349464][ T5059] vfs_read+0xf6/0x5e0 [ 1211.349472][ T5059] ksys_read+0xce/0x180 [ 1211.349481][ T5059] __x64_sys_read+0x3e/0x50 [ 1211.349490][ T5059] do_syscall_64+0x39/0x80 [ 1211.349502][ T5059] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1211.349504][ T5059] [ 1211.349507][ T5059] Reported by Kernel Concurrency Sanitizer on: [ 1211.349519][ T5059] CPU: 1 PID: 5059 Comm: systemd-journal Not tainted 5.9.0-rc3-syzkaller #0 [ 1211.349525][ T5059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1211.349529][ T5059] ================================================================== [ 1211.349534][ T5059] Kernel panic - not syncing: panic_on_warn set ... [ 1211.349544][ T5059] CPU: 1 PID: 5059 Comm: systemd-journal Not tainted 5.9.0-rc3-syzkaller #0 [ 1211.349549][ T5059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1211.349552][ T5059] Call Trace: [ 1211.349568][ T5059] dump_stack+0x10f/0x19d [ 1211.349578][ T5059] panic+0x207/0x64a [ 1211.349592][ T5059] ? vprintk_emit+0x44a/0x4f0 [ 1211.349607][ T5059] kcsan_report+0x684/0x690 [ 1211.349622][ T5059] ? kcsan_setup_watchpoint+0x41e/0x4a0 [ 1211.349632][ T5059] ? __fsnotify_parent+0x79/0x470 [ 1211.349642][ T5059] ? fsnotify_perm+0x292/0x2d0 [ 1211.349654][ T5059] ? security_file_permission+0x87/0xa0 [ 1211.349662][ T5059] ? rw_verify_area+0x12c/0x240 [ 1211.349671][ T5059] ? vfs_read+0xf6/0x5e0 [ 1211.349679][ T5059] ? ksys_read+0xce/0x180 [ 1211.349688][ T5059] ? __x64_sys_read+0x3e/0x50 [ 1211.349697][ T5059] ? do_syscall_64+0x39/0x80 [ 1211.349709][ T5059] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1211.349737][ T5059] kcsan_setup_watchpoint+0x41e/0x4a0 [ 1211.349750][ T5059] ? aa_file_perm+0x129/0xe00 [ 1211.349761][ T5059] __fsnotify_parent+0x79/0x470 [ 1211.349777][ T5059] fsnotify_perm+0x292/0x2d0 [ 1211.349790][ T5059] security_file_permission+0x87/0xa0 [ 1211.349800][ T5059] rw_verify_area+0x12c/0x240 [ 1211.349810][ T5059] vfs_read+0xf6/0x5e0 [ 1211.349825][ T5059] ? __fget_light+0xd0/0x260 [ 1211.349837][ T5059] ksys_read+0xce/0x180 [ 1211.349848][ T5059] __x64_sys_read+0x3e/0x50 [ 1211.349858][ T5059] do_syscall_64+0x39/0x80 [ 1211.349871][ T5059] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1211.349886][ T5059] RIP: 0033:0x7f380522992d [ 1211.349898][ T5059] Code: 2d 2c 00 00 75 10 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 de 9b 01 00 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 27 9c 01 00 48 89 d0 48 83 c4 08 48 3d 01 [ 1211.349904][ T5059] RSP: 002b:00007ffed02a9300 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 1211.349915][ T5059] RAX: ffffffffffffffda RBX: 0000562a45beee80 RCX: 00007f380522992d [ 1211.349922][ T5059] RDX: 0000000000000400 RSI: 0000562a45bf8cb0 RDI: 0000000000000010 [ 1211.349929][ T5059] RBP: 0000000000000d68 R08: 00007f38054e7f68 R09: 0000000000000410 [ 1211.349935][ T5059] R10: 0000000000080000 R11: 0000000000000293 R12: 00007f38054e4440 [ 1211.349942][ T5059] R13: 00007f38054e3900 R14: 00007ffed02aa130 R15: 0000562a45beee80 [ 1211.351189][ T5059] Kernel Offset: disabled [ 1211.658173][ T5059] Rebooting in 86400 seconds..