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", 0x1000}], 0x2, 0x0, 0x0, 0x40000}, {0x0, 0x0, &(0x7f0000003e40)=[{&(0x7f0000003c40)="e3788b41130841f9373a0425e1cae0bff7ec3270cf5734d779ef", 0x1a}, {&(0x7f0000003c80)="db7552b44b084be02d3819418c48862034c1bc89ed48a2723a36486a3a03b5e18a7b9369bb0967d2e1eb4aca6e239f48a045d7f62148f7d44fd6ff9127cdb7cbe6676afecf8b52f45c0cd0a52d1561b74b83c49831aef76e18c49f39174b6be819db29749cb886f618462ceda1d197352274895d749cfc5b917992613b780bc812d01f4a8b6c0fbad1fa0544a041ae1eb8c8ca5c824fcf9a4e7b59a07da69b10aa3a33a5c1c0b94a04", 0xa9}, {&(0x7f0000003d40)="ec4bd59f2b5aa8438ebf984f70326cfc153a987b97a15a235982082da4cc004cf95f0a5526ad3413516a6a06d3b55c12a081051bdde9be39c4b122e8c29656043d7f5fd7f38556c54dd0f594719efea17b8fe5f09935945e4cdcaf8083aee1df3ff9972ddf9131effe183feeb18e03732765a2d369733cc513d24cc05b00fd177c24fbe33cbcdcd14db592e094da9463ec047409fad053c336dab15c0a7b89d7b547117b383e4b52dda9676caecf1fdf621501908b9fa0b5ef8f4b6d8daa9380e1e35aecb28308977a6ca71413fb53bb9bd028834f01d084dbff263ec48920c58f27084714e6711fd48d4debcf65a942ec3ee588ed2e", 0xf6}], 0x3, 0x0, 0x0, 0x20000000}], 0x6, 0x4000000) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 419.268301] FAULT_INJECTION: forcing a failure. [ 419.268301] name failslab, interval 1, probability 0, space 0, times 0 [ 419.328154] CPU: 0 PID: 21433 Comm: syz-executor.1 Not tainted 4.14.148 #0 [ 419.335245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.344618] Call Trace: [ 419.347236] dump_stack+0x138/0x197 [ 419.350892] should_fail.cold+0x10f/0x159 [ 419.355081] should_failslab+0xdb/0x130 [ 419.359085] kmem_cache_alloc+0x47/0x780 [ 419.363180] ? lock_acquire+0x16f/0x430 [ 419.367191] ? check_preemption_disabled+0x3c/0x250 [ 419.372240] skb_clone+0x129/0x320 [ 419.375824] netlink_deliver_tap+0x681/0x8f0 [ 419.380272] netlink_unicast+0x4b2/0x640 [ 419.384375] ? netlink_attachskb+0x6a0/0x6a0 [ 419.388825] ? security_netlink_send+0x81/0xb0 [ 419.393435] netlink_sendmsg+0x7c4/0xc60 [ 419.397532] ? netlink_unicast+0x640/0x640 [ 419.401795] ? security_socket_sendmsg+0x89/0xb0 [ 419.406580] ? netlink_unicast+0x640/0x640 [ 419.410836] sock_sendmsg+0xce/0x110 [ 419.414582] ___sys_sendmsg+0x70a/0x840 [ 419.418580] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 419.423365] ? __fget+0x210/0x370 [ 419.426838] ? find_held_lock+0x35/0x130 [ 419.430931] ? __fget+0x210/0x370 [ 419.434399] ? lock_downgrade+0x740/0x740 [ 419.438554] ? __fget+0x237/0x370 [ 419.442020] ? __fget_light+0x172/0x1f0 [ 419.446019] ? __fdget+0x1b/0x20 [ 419.449392] ? sockfd_lookup_light+0xb4/0x160 [ 419.453898] __sys_sendmsg+0xb9/0x140 [ 419.457702] ? SyS_shutdown+0x170/0x170 [ 419.461698] SyS_sendmsg+0x2d/0x50 [ 419.465247] ? __sys_sendmsg+0x140/0x140 [ 419.469335] do_syscall_64+0x1e8/0x640 [ 419.473250] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.478130] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 419.483336] RIP: 0033:0x459a59 [ 419.486563] RSP: 002b:00007f6aef8bbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 419.494300] RAX: ffffffffffffffda RBX: 00007f6aef8bbc90 RCX: 0000000000459a59 [ 419.502795] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 419.510071] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 419.517354] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6aef8bc6d4 08:32:57 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = msgget$private(0x0, 0x64c) msgrcv(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000c70b0000000000000000000000000000000000000000e6ff00000000000000000000000000000000000000000000000000000000e9ffffff00000000005ded51cc00"/185], 0xb9, 0x0, 0x800) getpgid(0xffffffffffffffff) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'veth0_to_bond\x00', 0x9}) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:32:57 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400eeff2d00"/20], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:32:57 executing program 3: semget(0x1, 0x1, 0x93) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) gettid() r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RMKDIR(r2, &(0x7f00000000c0)={0x14, 0x49, 0x1, {0x50, 0x4, 0x2}}, 0x14) [ 419.524635] R13: 00000000004c7bff R14: 00000000004dd998 R15: 0000000000000004 08:32:57 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2080, &(0x7f0000000400)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532322c64656275673d3078303030303030303030303030303030302c63616368653d6d6d61702c61707072616973655f747970653d696d617369672c6673636f6e746578743d756e636f6e66696e65645f752c61707072616973655f747970653d696d617369672c646f6e745f61472272616973652c7065726d69745f64697265638a9be42bae7c758c72dea130d34974696f2c666f776e65723e", @ANYRESDEC=r1, @ANYBLOB=',seclabel,fscontext=staff_u,\x00']) gettid() [ 419.967776] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 420.059389] IPVS: ftp: loaded support on port[0] = 21 08:32:59 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x9) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) eventfd(0x6) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:32:59 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) io_getevents(r3, 0x801, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCSBRKP(r5, 0x5425, 0x80000000) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$void(r6, 0xc0045878) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x5) gettid() r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_udp_int(r7, 0x11, 0x0, &(0x7f0000000180), &(0x7f0000000200)=0x4) 08:32:59 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r4, 0x9}}, 0x10) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20000, 0x0) write$ppp(r6, &(0x7f00000000c0)="beb9e76396995543cf0c78ec05e6289a0327f9e992", 0x15) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:32:59 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400eeff2d00"/20], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:32:59 executing program 1 (fault-call:1 fault-nth:3): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:32:59 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4ec7104a, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="6b5212f12d000102000000000000000000000000e43e3bc20000000000000000000000000082477b691a1aac3f770416aa53c764a521444113933efa965e614c30a5caa9ea2a50fd2f78f4d27fe1aa281baa00edfc7e8163d43d0380025d92637ede0fc8edc3866beb11ad65fbbecbb6cfa9164a89a6d0203584342583968e3d73c73f575c8646899943441138b19b860b3b0ecd051be6dbc3a7d6d28475c6b53274f9524ba71c51dbdcd36bd4896617b1675efb7e74a6189f81abbe7bec0000"], 0x152}}, 0x0) r2 = gettid() tkill(r2, 0x3c) fcntl$setown(r1, 0x8, r2) [ 421.263181] audit: type=1400 audit(1570782779.080:154): avc: denied { map } for pid=21482 comm="syz-executor.4" path="socket:[75711]" dev="sockfs" ino=75711 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=unix_dgram_socket permissive=1 [ 421.332859] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:32:59 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0x4) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xe0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000200)="b0ce07375b4b2d7c3ffb9a6b7845a3ed42f2567d86d067d71570c13a7e1aa9d7f59496312a6eeceb869fb47c8634c3d8cacd4635d01ccb70ee7aff1efc87df88d779d161e8fd42e2bda24c28df2082791d46c37ec1ac79616f4dd062cdee6d55bdfa8868a6d1132107f34a09a6674590ec8d4f44a25ddbb7d24e7b60ff36fadffdc43024c6e8a2bdc1f83d9c52d434e7824379") getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/sevinux/mls\x00', 0x0, 0x0) gettid() 08:32:59 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() socketpair(0x11, 0x6, 0x5, &(0x7f0000000040)={0xffffffffffffffff}) r2 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r3, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0xd4, r4, 0xe21, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5c78350d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x75}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2ef7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x50b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x963b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9412}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8084000}, 0x1000) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x41000010}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x2e0, r4, 0x1004, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xf8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @remote, 0x2}}, {0x14, 0x2, @in={0x2, 0x4e22, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc0b0000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x42e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x8, @mcast2, 0xffff}}}}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3c1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}]}, @TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'nr0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6bd2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}]}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x80}, 0x48000) [ 421.392771] FAULT_INJECTION: forcing a failure. [ 421.392771] name failslab, interval 1, probability 0, space 0, times 0 [ 421.462541] CPU: 1 PID: 21495 Comm: syz-executor.1 Not tainted 4.14.148 #0 [ 421.469791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.479164] Call Trace: [ 421.481779] dump_stack+0x138/0x197 [ 421.485441] should_fail.cold+0x10f/0x159 [ 421.489627] should_failslab+0xdb/0x130 [ 421.493629] kmem_cache_alloc_node+0x287/0x780 [ 421.499192] __alloc_skb+0x9c/0x500 [ 421.502852] ? skb_scrub_packet+0x4b0/0x4b0 [ 421.507191] netlink_ack+0x21c/0x9a0 [ 421.510952] ? netlink_sendmsg+0xc60/0xc60 [ 421.515212] ? xfrm_netlink_rcv+0x61/0x90 [ 421.519390] netlink_rcv_skb+0x2fc/0x3c0 [ 421.523477] ? xfrm_dump_sa_done+0xe0/0xe0 [ 421.527736] ? netlink_ack+0x9a0/0x9a0 [ 421.531649] xfrm_netlink_rcv+0x70/0x90 [ 421.535642] netlink_unicast+0x45d/0x640 [ 421.539737] ? netlink_attachskb+0x6a0/0x6a0 [ 421.544321] ? security_netlink_send+0x81/0xb0 [ 421.548924] netlink_sendmsg+0x7c4/0xc60 [ 421.553009] ? netlink_unicast+0x640/0x640 [ 421.557270] ? security_socket_sendmsg+0x89/0xb0 [ 421.562039] ? netlink_unicast+0x640/0x640 [ 421.566306] sock_sendmsg+0xce/0x110 [ 421.570040] ___sys_sendmsg+0x70a/0x840 [ 421.574075] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 421.578863] ? __fget+0x210/0x370 [ 421.582327] ? find_held_lock+0x35/0x130 [ 421.586407] ? __fget+0x210/0x370 [ 421.589884] ? lock_downgrade+0x740/0x740 [ 421.594086] ? __fget+0x237/0x370 [ 421.597571] ? __fget_light+0x172/0x1f0 [ 421.601563] ? __fdget+0x1b/0x20 [ 421.604941] ? sockfd_lookup_light+0xb4/0x160 [ 421.609460] __sys_sendmsg+0xb9/0x140 [ 421.613279] ? SyS_shutdown+0x170/0x170 [ 421.617283] SyS_sendmsg+0x2d/0x50 [ 421.620828] ? __sys_sendmsg+0x140/0x140 [ 421.624900] do_syscall_64+0x1e8/0x640 [ 421.628812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 421.633690] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 421.638904] RIP: 0033:0x459a59 [ 421.642096] RSP: 002b:00007f6aef8bbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 421.649818] RAX: ffffffffffffffda RBX: 00007f6aef8bbc90 RCX: 0000000000459a59 08:32:59 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x4, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000010) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:32:59 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000200)={0x6a, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:32:59 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400eeff2d00"/20], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 421.657104] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 421.664387] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 421.671666] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6aef8bc6d4 [ 421.678948] R13: 00000000004c7bff R14: 00000000004dd998 R15: 0000000000000004 08:32:59 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x3, 0xa000) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xf) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) setsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000200)="3aa7a91dfe2fd0d29566963343e95b24d06d4ee832bd21133705a856e62f6699a7e596455291b37f43af6f07b99d65a5880f987f893cb680045e79396f9f516747345802d75f9beeeae5831bdc0870099ee1143f3be500816a12a7faae7d4819d56c909af2907393e3b2eb6b66f51817120249a19b8a3281d6ef8b710340482338f138ce8ac7096f8a914e42eaa3c0583fd39ec69bdee7a5acee08b956aaf13c1c4e7bc26055f23a22ef410a752c8cf04dc624922c40c16b29dcebc27931685170797812b8608a7e941e8a3e25ed0301f986803b6f8338a0c16746233ce7f21053554ca67d08b7defd5d86e5e548242794bf238e3d56f4eac8715ca342cad6f27a574277b39faec7ea4c280e3124d7aa9c87008c7caa852d6b25d577a84b4f97065131fbfb97a6cebb95bc9eb8c9fa50b35470e6122a97b20f7fe72176927183bf5b8eb3b316f91fdc3e11025c2d1eeda052e54498b2fa7331615f46e854ee6df6a5686e16fa69a0f61f625bb113f59e6b4a6956c986fb3add9b0524016634d897e440847e75cdd9cdbf1411ed209502e0bc5229eec6435fe563df31c016c3e09cff4b96578d3a089afea41f4d48c16322e62e1138f76a15236b1a1ae264c1916a8a3aa016a9b281b748efc395efd417aaad385d52c8a329400c896ebff468845780f4f5eeb94c38fda91cccd5c3a7e2b2c9d59e521188dfcecd43898adaabe908ca39d21ee36f90d8c025443255b82ea0858699f4009ae7d6e9e5bbe251c816190a9da5148155b444d5d08d8869ec2e37196c0f150ae6981496c8febcbb4af4e96efe6b87b42e94ec060ce3b46f25c06e9b786e9f5034edba50f09e38d87858954a6fe37468858fdac895a32f4378beda458d9a2c370ea1a69e76488b17ac9d840190bbe87d053eea4ca2bec1670bbde72f64cac034f5d13747f984b13e87dd3638be2a888ab42e44687ebc3a301f61c2b13f867b580fa41a41f9529c966197d0b28020a2ab8a4ec80ed78110fa7cd494b42bd52a492b887142b9f204de130c08e37bc3255c382eba8e4e74127f4ca858f54790d4d65ff92605627277c6ffc4312e8b35f3454babce0fd7b9b616caf9b02d5d6612df4f986cc3829f769aa729a819973ffa7e7e2f0561280ba8e652c29d99450d284c21161c8af80d757a7a3f8383c0e918cce8e4f69a7cad46e1e2dfb40dfd3cc17c9ef70549aa4ead8b62a018b1132b0d4d181f3ae35e22c30f8314df95d7ec8df995f0b4b03f3dee7fdb7e100c418932d206c936633c2f12866860f2f4e8a2e57f2f14bed26e195132eacb1876e218e0ba54d10f484955b1cf2c272f1c7d56dc82fee58fa4af6710289d16062a1f5581e5f905c47d9daa669234cde139084aa79de668e9cd33d8e744d313b9d538aa4af822f8488654a61299e0f3c85b0c6a8969bb1d919ac00f8ad560e9a8a38c9f1d0edef9f7ca24b0bb382921aa5f3fc32d5d5b6e17e92ab91d77a83583eacd7310c56106e05c87188f4bb151d7e176ea089ea7be3b8fcfe7ff116aa943928e34c675851fc03857ced01c5d2d08582113fba0acb6b13a240788f2caeba9eedf1b20310c76b72b8edca466b903259e4b072ba834ef09209e40738b269c1e7d3aeb6de3aed9c5853dc8a7dbad12987d1b5693196b1a60fe61f9eb5d7b51cff05f705614131c1bcab5238976f3596791e5826815a80f2100e7822d2927c1729efff1be6212d8ad2447deaa89e7785c94c54b8d8f869fa33bc629c11230b8cf71f4f0c7acdbd1b48b8bf440f302bb421d9ff9df40c95a40410a05e59a76172c878595f53d9700861056fa3faa37229ae72a08f72db3f83bf11dc1461ccff9d42a80e26fb8ab237dee6a3ab4994c3ce9afc0f7bd3b4ed2489a4e8cf7a257ba3452a49c4640cc624d8903e1674cbac29f8a22620a266fab2422abce94d0e08e5b948e1559464b7ac689f3da1e52eb7a180655f2fa6fca793a3acb04764b8f621dbddd4586aad73a50312b4726c64ec435648b63388ffaca64be93b343211a3196596733237bfd61b5ddaca7dacd3c305ecc2d20edf40b1965c51962aeeb160b0a7bbcf2d08134e2f27f22aa92b03d0757498b8deb5452c788ed62365e8507f8849d1df71e9459bd02e06ad8af297222acb814da70f7c19aa323a5dc272bbf1b31253580b33311d9a28996bbd411c2a534aadd6217f32227a435776723ddc03d4dba3dabedf0327876d99b83547aeab133dc74277f562095f0b0c7527e87ad0511225a0bf0df3496589c416126d896201541bd2d05015d5dfd0d998eb7c73562662c2a4071e820677649d36607bdf28bee9a58bc72b4b56264f0421152c6876f65e57a65b75b75aad5c2525a4f289d664393a7e5e32e6912ca1f182a58916f9156c39951d9bdafba03bb8c64cfa04e238ab86c62d3cf32af9cd9e53499a4b9e61e3de84d51f96bc245f3a1bdc968ef3caa5583e89b05703e0290c09636b84c5c859234f971992d184dc6b509110c98a075a0f3b0108aaebabc64d955362b7b41130b286bee8313dc6458462e531a8426ac16a89e955c4333d98a0cc4e4fbd23444349c9cc42acbd04ceb1421f00b551dd21205cb3b7490d6b33c035d968433b92327cd3cd45b27d5217ba507458142ef22b01b394bb93974d863a126fb9cefc2a79ad6b26b9d02e46d5407d838eeeacf4a9034216d25e15c58940b1983d7b7c6b56f7cc7741ed73250ce2af7ab9e03711f25dd37a0062ebe45234e4afca7e2d2b9e830ee25b090b69ccd017f7712540f1c7826a4784869d4ddaf8a2034b02fa9b718cdc5a81f4af8388fb40387851fd1ec7330e3bc1b73a6fc10f8180959ca0cf9879b0993723fc06f2dd8e75c847c81c110f56d886b6492d6e079f92b2b3d2ef9dcd4172c0dec6498680bb423725bd90e402c165ff99d78a27ebbf41969268fa169097820ca3e35b3fc349e7422022a7dcfc288f117f154beae2173a7f803dabaf009245f953193b71e15b38708a7df7137013d3396f5cbf8c658cc32049c74155830cf6d5d93dcfe6e1e7637be42246d85fdeea58ec4a619e5bb2bb5f92c3789883b2112a09d5835f3175f946d88eaa32a97fc1d94b4c7e21720a97e58a315937930cd16d49d875b8685742292c8f713771536f0830e8ec4355cb847ac75ba3b46b9978d98afdf1db01691de273b1e440fd4407a5d81aee97ba006ca0ff584b767d9e73e32c648684f6a4841a6bf0ea0a16d7f37fd850ae088583079cc15d3455b62ce2a3726684d6345499a794ec8e6663fa8e65ebd883d7d9da559dc587917f68d7e10cbbbe26c433b855c09a6d0e52552a57d900840c673936a57c17f88bcb2c833221e2f3e1a73b8327f3f98787aaea01aaf0e4fedf791734bde024abbeb9aa2f0c146735a243ef4abe7b72b488bbdf7c62bb0906d660a3303720af287580a22c118715e11912e07ac360b16fe498f537796a37751953951ade4c727ac1271676c57456ad543881e662ac148c6c5afb27b87504875eafdac811112557092ea2a81d3f2677ce2cb0e94a6317cc04a6f6826bc6ff4077329c9996996edf18dc1d7495f5190d17c13724ca5cd8014aa959e79ee6df00c6cb69967f0237879f6d08f9330c8b422d8e108cf43cddc324c6bffda16930c0317d8847af9c92306e0b32be7c73057f517f281252b78ae45ed47da4a9a8371b8f3655c45de27159f58812ee517bd51786e9e5bf0efd4424098b21f519f86b1061f946de35ebd6d92554ec5cd279b72e856034596be39db59fc17b002e95fbf15d8e0330e150e46cdb2943617906ae644699ba9a725743470571a9213d80ac61cbfb3a1aea53ae5d0ee53b4b20cc8362e6faaecd8b68ca798e414ae9a024d10629b9c54516bc7355e1ff67f20d91a2d47e40973e43f5436c3f68fd9d00f989881619ef7c38dd268064886917ac65ac72afb8b885e07f181911b24bdf5de131973e89dbdf0a449e2148eda63b54d8bf44b93f12abcfab91b8cf10c067f163e56785734994f7cb887187805038c73c67329b32d6962a134e86715b5f3a54548de4070b8f84b3421fd65acc62f187c61cbda075eae9dec9e35b641c60066e39dc73100c7cfd4bc05a8889bfa804a89c5eeff6964dd075dad8553f894f6ac2ce523b065f4a99e7316b3f2508995c0cea5422c5914659017bbdf2cf20439b4a899abadb8fc050169a4fdf123204db4320848e19078e521ee3eb25f7f8f6d63c05bb52ebfe2f6cada01479232870470e076a735a090483c08970fc01b17bdabd169879352170ce5ef32db8ecd1951f2416ea92aaf684a2dcfa3d1b2969bfd281e3dab5c644c396d252e9e93028291153a48e85dfb0704e8b2ed0fa8c34156ea069600df493f733bce5029ae761b8dda717eba384466c84080f978d288e02bc0fb68cde6527dc7d2f88f257529ecff52f7d6195b54e2049d19b435a7fa4b401d866d6d3790a1c59fc164172b86d059302e97bfa012089612a19937f4f39ad597dd95c806d7edded6d080b36607247cbddc83da3aa2e719d417215ba13a2ad42f43405e3591b65943b72d5b37ad21ea5171f911194c13ecf5d5abe595a34272ec3be30e6875fd5b44de5cd008ae455c95ff33430c320579b404b55a43aae389eed0a08c7f15d49e5d4b4f64c155522e4e15b7aef12ffbbf325a24a233a85f2c2afc078b69dd5117ef67b474bf064b4e09f0546c1a075024eff9cdc782a8b11d94624baa84fa505970afe74b2f9f43612f0533dee4e8bc24b38f04131f3e50eb9c720aff1cd63b2a5612e900c1581a5bf21ac293c871dbdbcec47a20419ae7e1dd66114902f911d3a9e6fbc8c4825d008ea87ab90029bb5dc058ddf109388d50706f840f17d4ac5713cb29b1b0f9f727485d50bf7c3341507f0bb9e8c81cfacac206bbc44af39b324df615860868694350910f1a6693405345e1ece39cfdae87cdef392a12e11be8a9fa7d348090248dfbb129e378cc5305b9f163afc89ca4f1887a22e3a900dba3eccbb8a8abcd3fa4589412cce6937a64b5192a7c57c68f06d6e7c06466ee35fc28d75715c553f6135f3245e81be2c372052d1a13f44f74af0f65a5832bfdfd1bfef1405ff909ad22fe0a09804b14428c6107bea867465cee32998dc730fbf4a213e56b93e03890422d0a1c34af842169f9fae39c965c56427930c61ff715aa4801fd630d23c42bfc1c254e6e440afdfa8596f6a48c05d8480725a85a02409cf72b10818b6824c568c2ee29bd537d9decd80d44fc3a9025b722b02b3712fafa14490e312e11b51b4dc1982016182df8384b012bbc8153a886c9befe46ab0759df14aaf9186a6d57dfb565aed93d1b782e89433172281b65bb6b917a2fba65aa2ad639a5cab7ed1962ce0c555d869019b0bb0d2659e2d5a16fe899f3475e9cecbd1be375622978b0e078d0f9dab079db2ad2d4bcecb808c5e24e4341ad5e193d075061fd23c239ab0aae42a9b2b53077b21fb44b8409dd939cf29e9688961fb3a0d8b16c80feb975aa03ea477ef62cbb26fc38889e3b4065ba3e35968611019c10d1ad6ea3a2e2aa5f32ce9ce12647399a41cec4e5b6d4e1c05f68cfd36894636da96de12643d066084d3a038d42be6550873024a1cab81062daccee45948fa8f3ffc10d055454ec18d2e543f4a9edd5c9d9c32f72c9f997f8b3d2e122102a00a11f47caef3fdf54362e4477ff6f67651937f19c0250f8bdc74e3a74c6aee9728bfab3f4e16b1f43ad19bc50f763fbb62a358f226de6b2b7db6989d0a05021c367a6d0942ec1", 0x1000) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r3 = socket(0x10, 0x3, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x506caa95f32484fa, 0x0, &(0x7f0000ff9000/0x4000)=nil}) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001380)=ANY=[@ANYBLOB="340000002d0001020000000001000000020000005f227bf951c9377c2ab4b015ba642f41c3da017025d1d6949391000078d68c82c710ec41b8347348ed1e27995088b0595bf2ba729a2713af00e349d4d16d1f68c35ead0c04fbe73e296833431d0f57c7397633e031582143fc17dcaa050651e2538230dc2fb50a21877661ad1ed28cbac34851ead0f6c3c42f6fdbfc69a13b68a275658176b3ae84f4624beef1d1e1614b5a66bfca9564a117162792c828cf6eb589bca6adcc122b330c491adb8599e4d2f8d4406e9888f9d13e4646b79901103fdf9834a4e02f477d934949f2de75b4f0dc761d7aad654cf1ea67d55fa3a7b9016344eb274aa360d769d526219bb5db76f610e8235372314c62ca797eab527af4f83a853e94495aa57de66d6cef9a2e65e42c367f9da257ff2b06fbebda540b4b54db38039e14beb41ca383f58f9c12c07967a0d38ccacbf707845d"], 0x14}}, 0x4bf7aa5aabcf2833) fcntl$setstatus(r3, 0x4, 0x4800) 08:32:59 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:32:59 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000040)={0x5, 0x4e944, "a359b9f655e3c10ca200d6521d8de4f4187a3e552954b619", {0x6, 0x632}, 0xffffe8df}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:32:59 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400eeff2d00"/20], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:32:59 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendfile(r1, r0, &(0x7f0000000000), 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff30, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) socket$isdn(0x22, 0x3, 0x23) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4) gettid() 08:33:00 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0300020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:00 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r3 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r4, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0xd4, r5, 0xe21, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5c78350d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x75}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2ef7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x50b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x963b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9412}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8084000}, 0x1000) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)={0x98, r5, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf50e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd0}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xdabc}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xcd34}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x2040}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000040)={'ifb0\x00', {0x2, 0x4e20, @broadcast}}) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) wait4(0x0, 0x0, 0x4, &(0x7f0000000200)) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:00 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) connect$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x40, 0x4, 0x8, 0x6, @remote}, 0x10) gettid() 08:33:00 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffff4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="142ebb0119991383b80000002d00010200000000000000f653d76b40"], 0x14}}, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r1, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x6, &(0x7f0000000000)={r2, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r2, 0x770}, &(0x7f0000000140)=0x8) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendto$inet6(r4, &(0x7f00000005c0)="1437bdf02d129f02caa52de6781a962044d7", 0x12, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x218040, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000540)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000580)='TRUE', 0x4, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x7, 0x200000) pipe(0x0) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000680)) syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_targets\x00') r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/56, &(0x7f0000000200)=0x38) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5c7c, 0x80702) gettid() prctl$PR_SET_TIMERSLACK(0x1d, 0x8) [ 422.495548] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 422.525054] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39193 sclass=netlink_route_socket pig=21574 comm=syz-executor.4 08:33:00 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) socket$unix(0x1, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400eeff2d00"/20], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:00 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) accept4$ax25(r1, 0x0, &(0x7f0000000040), 0x100000) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x2}, 0x8) 08:33:00 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x2200000a) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x6, &(0x7f0000000000)={r4, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f00000000c0)={r4, @in={{0x2, 0x4e24, @multicast2}}}, 0x84) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') gettid() lsetxattr$security_selinux(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:bsdpty_device_t:s0\x00', 0x25, 0x0) 08:33:00 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40161000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0xe419ee4c0c0df064, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2008a}, 0x24004144) syz_genetlink_get_family_id$ipvs(0x0) gettid() [ 422.692152] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4653 sclass=netlink_route_socket pig=21581 comm=syz-executor.4 08:33:00 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000200)=""/102391) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 422.782949] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 422.908189] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:00 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) accept4$tipc(r1, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10, 0x80800) 08:33:00 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() [ 423.259157] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:01 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) pwrite64(r1, &(0x7f0000000040)="e68467f762c79c24e605f2e87ef2c78b1ae5430f27fb66cc37ca5f258114447ecaa05d7227696cef0483b90f0b8f5493ad1571", 0x33, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:01 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x2, 0x9}, {0x16a0}], r2}, 0x18, 0x2) [ 423.391692] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:01 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff01000200000000003d699703dd314cd97b4f2528e91100000000000001000000000000000000000000aead0000000000000000000000000a000000000000008f6bcf2e0100008000000000d3d9d23a2678fec44000000000000000fb414c52885e759395c4f95a651ca54de4edfbc54366a516d701d0ed8700ca922f2c2e20b47178751ae851fc683c026b", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000000200)="fe29ccd19a04dbe92450b2a95b5aea46d613cd8f04919637fddfb0d5cebde16e1b60a994438e94a72f6eee37524f4844237a64a9ea0f1f6d2124289bf9b88c5787669d4b4abb1d13aae12ca7438bf74ddcecc97aade1d6eefe385643fc1dbd5e299b5ce965a26f91cfc77eda4da900463db6e17fb9198f6735f93474e2583060a9b2b693f7dfbc8ee6c37a12a5a0a6abb3b0bb6e2ce60fc1c3c6293d6e5e4ec0a6f987", 0xa3) 08:33:01 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) socket$unix(0x1, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400eeff2d00"/20], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:01 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:01 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80911, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x6}, r2, 0xffffffffffffffff, r0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40300004}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, 0x2f, 0x5a9, 0x70bd2b, 0x25dfdbfc, {0x7}, [@typed={0x8, 0x2, @uid=r3}, @typed={0x4, 0x39}]}, 0x20}, 0x1, 0x0, 0x0, 0x40440d1}, 0x40) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_IOCTL(r5, &(0x7f0000000180)={0x20, 0x0, 0x5, {0x9, 0x8, 0x6, 0x9}}, 0x20) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x80, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000140)=0xfffffffb, 0x4) 08:33:01 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x2, 0x9}, 0x920, 0x4}, 0x0, 0xa, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 423.579016] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 423.711236] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:01 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = dup(r1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) dup2(r3, r2) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) 08:33:01 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0xec}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4abe139f11af3105, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000100)={0x400000100002f}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000000)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) getgid() socket$inet6_tcp(0xa, 0x1, 0x0) fstat(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fstat(0xffffffffffffffff, 0x0) setresgid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) 08:33:01 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000040)) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x80, 0x0) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000140)=0x8) gettid() 08:33:01 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='mime_type-\x00') r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0x4}}, 0x0) 08:33:01 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='\x00\x00\x81\x00\x00\x00\x00\x00', 0x10b4080, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000200)="9d1820fc25e4e7a923eba450bc4f60ef581628e522d6a41be722727a0fb789467c4e90373910b0dc9acefaa7ced66e4bffcc83211819f996c1d1ef35d84fc362f28c8d5748012d84db3ed3ebdabdee9bc3d76a270069f7e3702202cfd017b8f4aff0221abfccd077826e7ab527333c4bd48f74a0174eca57b7b950b04a6cb716059ec84feac3c22f2d99f29cecc95d8e49bc8059d79edf5bd81ae06f474a1f304d75407b91948b5f0d679248923a3c27dc0fb0690001f36762d39d972a9f2a32dac077bbd6f7f87b69e5e9e42d0e955ada5113c2a72ebf", 0xd7, 0x3}], 0x800, &(0x7f0000000400)={[{@fmask={'fmask', 0x3d, 0x1}}, {@errors_continue='errors=continue'}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_yes='case_sensitive=yes'}, {@errors_remount='errors=remount-ro'}, {@show_sys_files_no='show_sys_files=no'}, {@disable_sparse_no='disable_sparse=no'}, {@umask={'umask', 0x3d, 0xe4}}], [{@appraise='appraise'}, {@fowner_gt={'fowner>', r1}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:02 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) socket$unix(0x1, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400eeff2d00"/20], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:02 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x12e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000140)={0x10, 0x8, {0x53, 0x8, 0x5d6e, {0x4, 0x81}, {0x8, 0x8000}, @const={0x1000, {0xfff8, 0x1, 0xce5, 0x9}}}, {0x53, 0x856, 0x2, {0x9, 0x7}, {0x0, 0x1}, @period={0x5a, 0x100, 0xf000, 0x56d1, 0x3, {0x9, 0x4, 0x401, 0x7}, 0x0, &(0x7f0000000040)}}}) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 424.361213] ntfs: (device loop2): parse_options(): Unrecognized mount option appraise. [ 424.424487] ntfs: (device loop2): parse_options(): Unrecognized mount option fowner>00000000000000000000. [ 424.507195] ntfs: (device loop2): parse_options(): Unrecognized mount option mask. [ 424.540840] ntfs: (device loop2): parse_options(): Unrecognized mount option defco. 08:33:02 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) fcntl$getown(r1, 0x9) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="126d44a6475fbda8f02aa2aec27deb01a0e2b07685d67297e448c248a880cce04e7bfa868542a76a6c541c94b903c80460751e869b023f9c9e9a5d20e5f9f0e600198fb9659f", @ANYRES64=r6, @ANYRES64, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYBLOB="2f4716154fcc7f08fdfc6e0c0c9c8a93b2599c32c927a6feb8f5e173cf0304ccb5a710e4e98fd75574c597a6d1135ab14d7a3b25", @ANYRES64=r1, @ANYRES16=r5, @ANYRES32], @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRES32=r1, @ANYPTR64, @ANYRES64, @ANYRESHEX=0x0, @ANYRES32=r4, @ANYRES64=0x0, @ANYBLOB="ebf024b41b1ec7ab0e8004e7c48781d36f8cde2615e8d1cb9874866d4439524ac10f99046f3f39f3204b1453eac0e70e012d6f6db1c748ba70524dcec41bf89f52ac0a0090dcf3efb610bfd22e1749aef773e2603f8d24ba799a5e72a04d9a57b585ee01b882b4d474954625ea1b685c020d6baf3c64f3949f7c3e95cb3a6c4c93a24da722a05c72ebbe5181c067d70bf590920db43c5779ec694b69df0e1d949f291a5d26919b64eadfe6f434ae235e2d547321910326c9cc9c5756cb4a9054009c37b4a4873f", @ANYPTR64, @ANYRESDEC=r0]], @ANYRES16=0x0], 0x5}}, 0x4000000) 08:33:02 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f00000000c0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:02 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) ustat(0x1e94bb7b, &(0x7f0000000200)) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x6, 0x129c, [0x0, 0x20000380, 0x200004c6, 0x20001162], 0x0, &(0x7f0000000240), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffff8, 0x1, [{0x9, 0x4, 0x9100, 'netdevsim0\x00', 'bond_slave_0\x00', 'bridge0\x00', 'caif0\x00', @link_local, [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], @remote, [0xff, 0xff, 0x0, 0xf0c4b3381fcfed79, 0x0, 0x80], 0x9e, 0xe6, 0x116, [@connlabel={'connlabel\x00', 0x8, {{0x4}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"3c699965fe9961a7e1b39deaec92b8e75b842d39715ce87c8f9abaf6d75b"}}], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffc}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x2, [{0x0, 0x50, 0x88be, 'rose0\x00', 'team0\x00', 'lo\x00', 'gre0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff], @remote, [0x101, 0x0, 0xff, 0x0, 0x0, 0xff], 0x916, 0xa76, 0xaae, [@among={'among\x00', 0x880, {{@zero, @zero, 0x5, {[0x0, 0x4, 0x1ff, 0x9, 0x76c9, 0x4, 0x401, 0x40, 0x5, 0xa6f, 0xffffffff, 0x7fffffff, 0x400, 0x1, 0x8f8, 0x1bc7, 0xffff3df4, 0x2, 0x0, 0x5, 0x9, 0x3, 0x7fff, 0x7, 0x5, 0x0, 0x80b, 0x7702, 0x3, 0x101, 0x6, 0x1, 0x80000001, 0x6, 0x10001, 0x5, 0x6b, 0x95, 0x35a, 0x6, 0x80000001, 0x6, 0x7ff, 0x7, 0x200, 0x80000001, 0x80000000, 0x1, 0x7b32, 0x0, 0x2, 0x8, 0x6, 0x400, 0x2, 0x8, 0x74, 0x101, 0x4b538f39, 0xf463, 0x2c60, 0x1f, 0x8, 0x5, 0x100, 0x6814, 0x65, 0x401, 0x2, 0x5, 0x7, 0x1ff, 0x5, 0x6, 0x4, 0xce1, 0x1, 0x5a, 0x2, 0x6, 0x4, 0x8, 0xdd, 0x3f, 0x5, 0x3ff, 0x3, 0x4, 0xdb, 0xffff, 0x401, 0x81, 0xc79c, 0x81, 0x4, 0x8, 0x1, 0x9, 0xffff0001, 0x6, 0x61, 0x2, 0x0, 0x80, 0x3, 0x8, 0x600, 0x7, 0x3ff, 0x9, 0x101, 0x3, 0x2, 0x3ff, 0x7, 0x40, 0xfffffffe, 0x4, 0x8000, 0xfff, 0x9, 0x5, 0x6, 0x5, 0x0, 0x7ff, 0x6ef4, 0x9, 0xfffffffa, 0x8, 0xfffffffb, 0x7fff, 0xfff, 0x618, 0x0, 0x1, 0xb92, 0x6, 0x400, 0x4, 0x18, 0x0, 0x8000, 0x6, 0x80, 0x5, 0x7f, 0xa10, 0x8, 0x7fff, 0xe57, 0x1000, 0x8, 0x40, 0x45a, 0x6, 0xffff17fb, 0x5, 0x5, 0x4, 0x4, 0x166, 0x0, 0x6, 0x6, 0x1, 0xfffffff9, 0x6, 0xf29, 0x4, 0x3, 0x400, 0x1ff, 0x1f, 0x3f, 0xfff, 0x4, 0x1000, 0xc27, 0x1200, 0x3, 0x96cd, 0x3, 0x20, 0x48, 0x0, 0x9, 0x6, 0xffffffff, 0x1, 0x40, 0x4, 0x0, 0x6e, 0x80000001, 0x7fffffff, 0x0, 0x7f, 0xf2e3, 0x6, 0xce, 0x7, 0xdd, 0x2, 0xbf, 0x7, 0x100, 0x0, 0x1f, 0x7, 0x4, 0x4, 0x7, 0x4, 0x9, 0x4633, 0x0, 0x7, 0x2, 0x2, 0x4, 0x5, 0x0, 0xffffffff, 0x7f, 0x3dd, 0x80000000, 0x400, 0x80000001, 0x101, 0x3, 0x4, 0x81, 0x3ff, 0x3, 0x5, 0xc, 0x1, 0x1, 0x6, 0x1, 0xff, 0xff, 0x800, 0x1000, 0x0, 0x2, 0x7, 0x3, 0x100, 0x7, 0x5, 0x8, 0x8, 0x53, 0x800, 0x7]}, {[0xfffffffe, 0xa372a09, 0x1, 0x6, 0x7f, 0x7, 0x1, 0xffff, 0x800, 0x64b9a6d5, 0x0, 0x3ff, 0x5, 0xffffff62, 0x2, 0x2, 0x80, 0x2, 0x2, 0x85, 0x4, 0x8, 0x5, 0x7ff, 0x4, 0x9, 0x20, 0x5, 0x4, 0x0, 0x4, 0x7fff, 0x3f, 0xe91e, 0x1, 0x9beb, 0x4, 0x5, 0x0, 0x2, 0x100, 0x0, 0x6, 0x8, 0x4, 0x10000, 0x2, 0xfc000000, 0x10000, 0x7fffffff, 0x7, 0x1, 0xf3, 0x8, 0x20000, 0x100, 0x200040, 0x40, 0x5, 0xff, 0x80000000, 0x7, 0x9, 0x0, 0x5, 0x2, 0x0, 0xfffffff7, 0x3, 0x1ff, 0xfff, 0x401, 0x2, 0x9, 0x3, 0x8, 0x80000001, 0xfa9, 0x20, 0x1, 0x4, 0x1800000, 0xff, 0x13, 0x1ff, 0xbb, 0xfffffffb, 0x2, 0x9, 0x0, 0x63, 0x0, 0x6, 0x1, 0x4, 0x0, 0x800, 0x2, 0x2, 0x7, 0x1ff, 0x800, 0x9, 0x4, 0x1, 0x4, 0x1, 0x1, 0xfff, 0x7, 0x6, 0x8, 0x8001, 0xfffffffa, 0x3, 0x7, 0xff, 0x8001, 0x1ff, 0x0, 0x60000, 0x6, 0x4, 0x2, 0x200, 0x464e, 0x5a, 0x80000000, 0x2, 0xa36, 0x83f, 0x8dc3, 0xa6, 0x200, 0x4, 0x3, 0x4, 0x9, 0x4, 0x1, 0xb1c, 0x1, 0x3, 0xfffffc00, 0x8, 0x7, 0x1, 0x0, 0x0, 0x4, 0x7fff, 0x7c, 0xffffffff, 0x1ff, 0xffffffff, 0x2, 0x20, 0x497, 0x8001, 0x1, 0x4, 0x40, 0x3, 0x0, 0x3, 0x32fa, 0x0, 0x6f63, 0x80000001, 0x5, 0x200, 0x4, 0x0, 0x4, 0xb46, 0x1b85, 0x14e8cdf2, 0x3f, 0x7, 0x7fff, 0x1f, 0x3, 0x7, 0x9, 0x1, 0x1, 0x2, 0x340e, 0x7fffffff, 0x6baa, 0x3, 0x5, 0xea81, 0x5fbf3b63, 0xff, 0x7, 0xe0, 0x7ff, 0x4, 0x4, 0x5, 0x1cd9c7da, 0xda1, 0x7f, 0x8, 0x7, 0x8, 0x4a55, 0xffff, 0x7, 0x0, 0xffffff81, 0x6980, 0x200, 0x3, 0x1f, 0x4, 0x200, 0x8, 0xffffffff, 0x8, 0x8, 0x10000000, 0x1, 0x8093, 0x4d3c, 0x2, 0x7, 0x1000, 0xf4a5, 0x200, 0x6, 0x0, 0x958d, 0x400, 0x80, 0x0, 0x10000, 0xaaa, 0x5, 0x5, 0x81, 0x7, 0x80000001, 0x1000, 0x7fffffff, 0x7, 0x1000, 0x7e, 0x0, 0x40000, 0x7fff, 0x9, 0x0, 0x1, 0x9, 0x10040000], 0x8, [{[0x2, 0x2], @local}, {[0x800, 0x9], @empty}, {[0xc3, 0xffffff00], @empty}, {[0xdf1c], @multicast2}, {[0x1, 0x3], @empty}, {[0x8], @rand_addr=0xa0b}, {[0x40, 0x2], @empty}, {[0xd4b3, 0x4], @dev={0xac, 0x14, 0x14, 0x27}}]}}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffd}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0xff, 0xffffffff, 'system_u:object_r:var_run_t:s0\x00'}}}], @common=@dnat={'dnat\x00', 0x10, {{@remote, 0xfffffffffffffffe}}}}, {0x5, 0x10, 0xc, 'caif0\x00', 'ifb0\x00', 'vlan0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], @empty, [0x0, 0xff, 0xff, 0x0, 0xff, 0x7f], 0xa6, 0x16e, 0x1be, [@mac={'mac\x00', 0x10, {{@random="6f5841b70c2d", 0x1}}}], [@common=@nflog={'nflog\x00', 0x50, {{0xffffffff, 0x7, 0xd08e, 0x0, 0x0, "1c32b13fad0e4bd7574589a2758ae1e8f9f08ff6da5d2f6c65dbe1af47b3c212f93db1a9e0c138d5e5d88b34ec8837205eb1c0e0451e6f1f619ac97699102951"}}}, @common=@log={'log\x00', 0x28, {{0x6, "0fc1ce219d7bbf0a80950ea7f2042b35afea5925a8d5b16e1c07ea543e78", 0x9e7a3149ffd3a888}}}], @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x800, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x3, 0x0, 0x2, [{0x3, 0x8, 0x6007, 'ipddp0\x00', 'dummy0\x00', 'bond_slave_1\x00', 'tunl0\x00', @random="9f40a66e1383", [0x101, 0xff, 0xff, 0xff, 0xff], @empty, [0x7f, 0x0, 0xff, 0x0, 0xff], 0xe6, 0x116, 0x146, [@ip={'ip\x00', 0x20, {{@empty, @rand_addr=0x7, 0x1fffffe00, 0x0, 0x80, 0x33, 0x2, 0x1, 0x4e20, 0x4e21, 0x4e20, 0x4e21}}}, @m802_3={'802_3\x00', 0x8, {{0x6, 0x9e7, 0x4, 0x4}}}], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0xffffff80}}}], @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}}, {0x11, 0x10, 0x6005, 'team_slave_1\x00', 'ip6tnl0\x00', 'bond_slave_0\x00', 'bridge_slave_0\x00', @dev={[], 0xb}, [0xff, 0x0, 0xff], @empty, [0x845db17135a247d2, 0xff, 0xff, 0xff, 0x0, 0xff], 0x12e, 0x196, 0x1c6, [@limit={'limit\x00', 0x20, {{0x10001, 0x10001, 0x1, 0x3, 0x7fffffff, 0x632}}}, @ip6={'ip6\x00', 0x50, {{@loopback, @dev={0xfe, 0x80, [], 0x19}, [0xff, 0x0, 0xff, 0x1fe000000], [0xffff00, 0x807fffff, 0x80ffffff, 0x7f], 0x9, 0x29, 0xf1f87781f4fa6e52, 0xa80f6a98ae7f6525, 0x4e21, 0x4e20, 0x4e21, 0x4e24}}}], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x1aed93bf}}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 0xfffffffffffffffd}}}], @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}}]}, {0x0, '\x00', 0x5, 0xfffffffffffffffe, 0x1, [{0x9, 0x2, 0x15, 'veth0_to_bond\x00', 'rose0\x00', 'batadv0\x00', 'syzkaller0\x00', @local, [0x0, 0xff, 0x181, 0x0, 0x0, 0x7f], @broadcast, [0xff, 0x0, 0xff, 0xff], 0x6e, 0x116, 0x14e, [], [@common=@nflog={'nflog\x00', 0x50, {{0x34, 0x2, 0x7, 0x0, 0x0, "890446891e04b864887ab6ecac1ddcb1f46518b3470d33a1f616f3083dbcde407519edc4cea94cfc0eedbfdd3b659c684fbaf9c75cf26768ba549eb4e2c920fc"}}}, @common=@STANDARD={'\x00', 0x8}], @common=@mark={'mark\x00', 0x10, {{0x80000038, 0xfffffffffffffffe}}}}]}]}, 0x1314) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140009002dfb000200d5000000000000e0ff8000"], 0x14}}, 0x0) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000140)="8dbdebb12469d6f407087004bbd7b01747d3ceb989d7aea4719669d120b0586451a3d47536ec6d249c532c82310e598619a59a0604ac76e4507f8ee37867529b6a947a2889b796adddaa9f7f37cb94274a969ff9a6e43168260d14bee33921") bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001640)={r0, &(0x7f0000000300)="6ab0928ef72bc8ce"}, 0x20) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f00000000c0)=0x4) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:02 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xd623, 0x0, 0x0, 0x0, 0x0, 0x8b8c}, 0x0, 0x9, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000040)={0x0, 0xc0000000}) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:02 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x60000) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) [ 424.856549] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64301 sclass=netlink_route_socket pig=21711 comm=syz-executor.3 [ 424.869766] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 424.908462] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:04 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "b6099133bef82ff0ff871d1064dd4de0"}, 0x11, 0x2) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:04 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400eeff2d00"/20], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:04 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xd2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = msgget(0x0, 0x0) msgrcv(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000009003ad5d000000000000000000000000000000000000000000000000000600"/100], 0x64, 0x2, 0x19655e533ab6f9b2) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0xffffff93, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() accept(r0, &(0x7f0000000140)=@hci, &(0x7f00000000c0)=0x80) 08:33:04 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = gettid() tkill(r1, 0x3c) ioprio_set$pid(0x2, r1, 0x1ff) r2 = socket(0x10, 0x3, 0x0) r3 = shmget(0x3, 0x4000, 0x80, &(0x7f0000ffa000/0x4000)=nil) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) getresgid(&(0x7f0000000700), 0x0, &(0x7f0000001d40)=0x0) setregid(r6, 0xee00) r7 = socket(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_xfrm(r8, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000680)={&(0x7f00000005c0)=@getpolicy={0x84, 0x15, 0x454533d87d26fae1, 0x70bd27, 0x25dfdbff, {{@in6=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e22, 0x0, 0x4e21, 0x20, 0xa, 0x20, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x6e6bb4, 0x4}, [@extra_flags={0x8, 0x18, 0xfffff0e7}, @lifetime_val={0x24, 0x9, {0x7fffffff, 0x200, 0x5, 0x101}}, @etimer_thresh={0x8, 0xc, 0x3f3}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) sendmsg$nl_generic(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000004c0)=0x0) r11 = gettid() tkill(r11, 0x3c) r12 = getpid() sched_setattr(r12, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000500)={{0x6, r5, r6, r9, r10, 0x8}, 0x6481, 0x8, 0x8, 0x1, r11, r12, 0x401}) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0xfffffffffffffde5, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES16=0x0]}}, 0x800) r13 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r13, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x201c, 0x100, 0x1, 0x0, {0x18}}, 0x14}}, 0x800) r14 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r14, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES64=r2, @ANYRES32, @ANYRESHEX, @ANYRESHEX, @ANYRESOCT=r13, @ANYRES16=r0, @ANYRESHEX=r14, @ANYRESOCT=r0, @ANYBLOB="1d9edb1a090c299e75c7349e9699d8f7e93b36a7d710125a2a9ce7538ef88135b06e755476f5bc4ffffffffffffffffa35ed8c4a182be8d7541d9a252d249c0368648b4452f74ac1eee94e7bf63ee7c9894dd267f1f092fcbbaa02e558a6398a03a31c94fcdbaf35fe7c761c8c713daf3310f273b9a66ce1952014502bc91e7726d116243786e463279df8c57e6e3b8932e618e48592d6519b5ff9867fd53b1652f0331458a7a1c7b9c4a747843c66aa49c184181435bbab90bca2fde195d0bcccd416942b5ecb6ecf0bff6215548bbf", @ANYBLOB="20810cd957f54330480c8852b0a4529617211faa965f2445416f11a561a3d9b88ee2b62e2fba9fb59abea0c0a56d636cb7a2dfccfd415cde2f51ffd7a85c3e3c9d1e4d8b5cbbe65d51b855b8ed28"], @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff210000000000000000000000000100"/109], 0x4}}, 0x0) 08:33:04 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={r1, 0x0, r3}) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) gettid() 08:33:04 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000002d00010000000000fedbdf65e9ffffff07001f0006000000"], 0x1c}}, 0x4) getpeername$ax25(r2, &(0x7f0000000200)={{0x3, @null}, [@remote, @bcast, @netrom, @remote, @null, @bcast, @default]}, &(0x7f0000000180)=0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000002b000102050000100000000000000000"], 0x14}}, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000440)='/dev/dmmidi#\x00', 0x101, 0xa666808b14b7eed) ioctl$VIDIOC_G_FBUF(r4, 0x8030560a, &(0x7f0000000500)={0x9a, 0x13, &(0x7f0000000480)="16ea14600c9a343445267e41ba0a7d20fc51b808d3bcc9bab962039d0f11f7fc4fb9090a9ba10717c4b8257330b8e3a5f0a4cf211de4a5351620aba146062dfaf394d8f3303975f99827188518c676d11e2aadbae8bfe58dec4eef351ddbf1763e2b087ba1bb339e7c85fe2f64f271020d53cddcf6d403385a68249d68daf9", {0x720a, 0x8, 0x4c314356, 0xf187b78217e0da5e, 0x80000000, 0x7, 0x8, 0x9}}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000140)=0x4) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r5 = getpgid(0xffffffffffffffff) open(&(0x7f0000000400)='./file0\x00', 0xec600, 0x18) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) getpid() ptrace$poke(0x5, r5, &(0x7f0000000300), 0x6) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000380)={0xc, 0x70, 0x40, 0x1f, 0x9, 0x3f, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x66ce, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x80, 0x5297, 0x7fff, 0x2, 0x1, 0x80000000}, r6, 0x2, 0xffffffffffffffff, 0x1) 08:33:04 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES64=r0, @ANYRES32=0x0, @ANYBLOB="0000210000000000000000000000000000000000000000000000000000000000003bd951a60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0x4}}, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000400)=ANY=[@ANYBLOB="000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000002000000050000000000000000000080ffffffff7f000000000000000400000000000000000000000000000000000000000000000000050000000000dbfc00008000000001000000000000000001000000000000000000000000000000ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005403b2044c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfffffffffffffff000000000000000000000000000000e1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009de642bfe571cc1c1c6a5fd828b28cc2f4f6a9c4adc00c1877e477eadb8a90b8bd21ad422427e1e3308b254850962a8598b7c3b678f71e3ee5ca90d7c9fff23b89f5f2a1c54e31a15e0f0dec970dd41b17f84a6bc484b31daf85754abde318a5d29ac0254feeaa6044ddd8b99a3e4c6f6c7a4b4513a567984890bce0cead09d6c4b600c6aa53ff6affbb1425eb5eab6e32d8ee72b7cfbd15b28e7c8616e47758ead986d99f317524bb6569fd7e0bdc593989dca64bbf642ccb2216b666bb4790ae95d5110b5a85d61634609e854285e26e3350ac9c391a29e518ec4a90dc66803c0d15367de1b193d0020c8d59c66b9f381911b5fc82d200730c070bcbea4c51231067ff5928125b9e0de4f0f693ab397b31776b6a538baeebb3d30fba"]) 08:33:04 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000480)=[{&(0x7f0000000200)="3f8eed804d13f55b17869d180f4d3cde0ffb4e39b61cf848bd7bced15bbea13ccc625186d897103c667f934ac57bf36a8f784064f6c11f0a129ff58b485a5f5f7967463e1a0d8b4918368ab97bbfdbad946da46f34ff20a14d73c8302361eaac43f00f2e35738cd9d4d0edd8fe790c27e2468068b8287d20b9ebe92ab0fc65cbe70c16b42a6f0e753eb465a467bbf29ce1693e9d3fd64c888f73ee86478edfdfb515b059548516c7eea3884f72b0c3b5079b1a27adf59fc8af9148005bfda9c2f833fe443cc54f7131acf9c2b8e85435640598141582764e9c577f9e", 0xdc, 0x10001}, {&(0x7f0000000300)="99865c45fab2fd1fa8904526953bcfc54f2830a1ff2b187f97523b30258696c80cba9a072b456bc3c0363da718d01da3802ef0c286430279485b4cba80cf168683afa612d6b07ffe581ef4dd9d5e8cefc53f6989888634239983514250181c40edbc2a1cd7b1a7a287080c3b60c979b5297aff927c193ca9695ea77ba21fe3adc0d48bb6f409b431191d4bd15743282d8a1a07d55fdbe9de76a241479b641fdd934cde546781538d817e8e0d73d8541e4c1399f2dc17c87191123fd85eab5620b769f14ba77d486fb35bba2b2a700bddcb4be362f4757e7a27ff625ce6cb72b024d5747a3b893eeb7a2944cefa006452c4d9", 0xf2}, {&(0x7f0000000140)="0d085fb11b222e74ad15ac59772a41f4a27b92b02b4053c1df3004d2b4f56e49aa0b3e7d63e10360755e6b1d04b316895f5b15eb552ec8e6c2958fe8de1510fbd350eeff04b94cb6a0da60413d92552c94ff983d3f29f70ba144b59b2c3ecd4cbc83c6d3", 0x64, 0x10000}, {&(0x7f0000000400)="d33be6d924f58ca7d35b07f1bdf5771d1fb4a464489a28e1178dab84918630942889e6486ea2c9dbd500a609910784c66573d355e9ad22dd1bbf3dc6818769aaa164d2e032b988005be1fc9e5f7e4af2caaeece0f8", 0x55, 0xf6}], 0x100020, &(0x7f0000000500)='\\ppp1\x00') ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:04 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$IPC_RMID(r0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) timer_create(0x6, &(0x7f0000000000)={0x0, 0x24, 0x4, @tid=r1}, &(0x7f0000000040)) shmctl$IPC_RMID(r0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:05 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'b\x7fnd0\x00', 0x4}, 0x9) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) [ 427.229645] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=21739 comm=syz-executor.4 08:33:05 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000012c0)=ANY=[@ANYBLOB="14e1940fbc4e01c7691fc2550000002d0001020000000000000000000000004b3c3947f29d5d40a5ac0c4f414988993e3d8a0c17f224ca7c36056ece83449ce5c313d7a3af811aed2f4180b45a7fd474dc8d64c2d361453d66e87cb76f71e5a45270109742a811fb61f8e1e09dc88c095f180363c1018f87b92a48b8fbcd00f0078d9a423896ab2bec3b5bb5445f7d632285533909a192d9"], 0x14}}, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000001200)={0x1, {{0xa, 0x4e23, 0x14000000, @empty, 0x1ff}}}, 0x88) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$bt_hci(r2, 0x0, 0x2, &(0x7f0000000200)=""/4096, &(0x7f0000000040)=0x1000) gettid() 08:33:05 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x200000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0xfff, 0x4000) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x340f80, 0x1) ioctl$TCSBRKP(r2, 0x5425, 0x4e19) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGBITKEY(r4, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x28}, 0x10) gettid() [ 427.498893] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:05 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x1, 0xf0db, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:05 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400eeff2d00"/20], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 427.641218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=20156 sclass=netlink_route_socket pig=21777 comm=syz-executor.3 08:33:05 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000230000000000000000000000000000000000000000000000c20c719dce00000000000000000000000000000000009214baaef9515477dff790c61b55a8820000000000004845ce000000000000000000000000000000000000cf6e0000001622000000000000000000001b3d40ef0e1ecd9aa89bab2044610a3b767057cc78a69da75ddc89045bba08bd37ceb91482dc43ea8feec399860f63729da471259cf9fc4639c917af57bb29a21ea509eb8ee664eba88a16d9f79d9161469cdc3f746fb31b11dbf56e3e55da2d528e3e92d9302448fdfb18a246d9005749a6fd17f3e6e0df3f90ff5c8fb89e1c31514323fd3f25d0366d894485806c8b"], 0x4}}, 0x0) 08:33:05 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000200)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x5, r1, &(0x7f0000000140)="012fc04d55b691f1955347e79867b67949ce131ccc573277cdcffcabd3647ff50ffa4d821abd30cdf3fb07bc86d4bc3c3ccb3babcad96c1839d905e7a28ff963c396120af0f4c0129e3808a15ff25b020a89226ea0a9e3bac30dc61b2337b6776b704ec91b39e45116ce6564508d", 0x6e, 0x2, 0x0, 0x2}]) gettid() getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@multicast2, @local}, &(0x7f0000000040)=0xc) 08:33:05 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400eeff2d00"/20], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:05 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000001c0)={@remote, r2}, 0x14) 08:33:05 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x6, &(0x7f0000000000)={r3, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000140)={r3, 0x3c, "0fecc3a48dd4abdc5b0630d930788c88be993dc6e1632194c3de98711755a1e28501508927eef0255bd35134d96bf83adf176200d947005e52295804"}, &(0x7f0000000040)=0x44) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e23, 0x0, @rand_addr="e3999a6b46b0a2821923456cf205756f", 0xcc}}}, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:05 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000140)={0x1, [0x81, 0x7ff, 0x9, 0x7f, 0xc3d, 0x0, 0xfff8, 0x6, 0x6, 0x1, 0x6, 0xffff, 0x9, 0x8001, 0x3, 0xfff, 0x6, 0x7, 0x4, 0x7, 0x40, 0x0, 0x9, 0x1, 0xa1, 0x0, 0x2, 0x2, 0x5, 0x4, 0xff81, 0x7, 0xfffc, 0x1000, 0x7ff, 0x6, 0x2, 0x401, 0x400, 0x7ff, 0x800, 0x2, 0xaf, 0x3, 0x7, 0x20, 0x3ff, 0x1], 0x5}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000040)) 08:33:05 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000000c0)={0x1d20, "6daf0dbd82e4d1227d207b1898627a845b97e6d22da5620068f019a2474e7315", 0x3, 0x40, 0x0, 0x7, 0x8, 0x3, 0xfffff42c, 0x7fffffff}) [ 428.035246] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 428.048601] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 428.185022] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:06 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 428.242748] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:06 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) tkill(r1, 0x21) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000000)={0x1ff, 0x7f, 0x1ff, 0x7fff, 0xd5, "85ec9b039c73ee78e72833700e3985a6defd3f", 0x5, 0x1}) gettid() r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x7, 0x2}, 0x0, 0x0, &(0x7f0000000200)={0x0, 0xe, 0x1f, 0xff}, &(0x7f0000000240)=0x100000001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0xffffffffffffffff}}, 0x10) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50, 0x0, 0x8, {0x7, 0x1f, 0xffffffff, 0x4000, 0x7, 0x6, 0x4bd7, 0x8001}}, 0x50) 08:33:06 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:06 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000200)={0x80000001, 0x8, 0xfffffff9, 'queue0\x00', 0x29}) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) recvmmsg(r3, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/226, 0xe2}, {&(0x7f00000003c0)=""/247, 0xf7}, {&(0x7f0000000140)=""/111, 0x6f}], 0x3, &(0x7f00000004c0)=""/4096, 0x1000}, 0x10000}, {{&(0x7f00000014c0)=@pptp, 0x80, &(0x7f0000001780)=[{&(0x7f0000001540)=""/245, 0xf5}, {&(0x7f0000001640)=""/67, 0x43}, {&(0x7f00000016c0)=""/91, 0x5b}, {&(0x7f00000000c0)=""/54, 0x36}, {&(0x7f0000001740)=""/52, 0x34}], 0x5, &(0x7f0000001800)=""/120, 0x78}, 0x3}, {{&(0x7f0000001880)=@nfc_llcp, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001900)=""/191, 0xbf}, {&(0x7f00000019c0)=""/170, 0xaa}, {&(0x7f0000001a80)=""/220, 0xdc}, {&(0x7f0000001b80)=""/178, 0xb2}], 0x4, &(0x7f0000001c80)=""/251, 0xfb}, 0x4}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001d80)=""/53, 0x35}, {&(0x7f0000001dc0)=""/115, 0x73}, {&(0x7f0000001e40)=""/57, 0x39}, {&(0x7f0000001e80)=""/126, 0x7e}], 0x4, &(0x7f0000001f40)=""/235, 0xeb}, 0x4}], 0x4, 0x2, &(0x7f0000002140)) gettid() 08:33:06 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:06 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000040)=""/33, &(0x7f00000000c0)=0x21) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:06 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x18d, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000040)) gettid() 08:33:06 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xf5, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7f, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r1, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x6, &(0x7f0000000000)={r2, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x5, 0x100, 0x2, 0xfffffffd, 0xd64, 0x8, 0x2, 0x191, r2}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r3, &(0x7f0000000140)=0x4) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:06 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) bind$packet(r1, &(0x7f0000000140)={0x11, 0x5, r2, 0x1, 0x3, 0x6, @remote}, 0x14) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:06 executing program 5: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='Cgr\xc8\xad;gds\x1amr\"\xcf\xefup2\x1e', 0xc63c3307450d8165, 0x0) getpgid(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r1, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$isdn(0x22, 0x3, 0x23) pause() getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x6, &(0x7f0000000000)={r2, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000040)={r2, 0x13, "619d135c6d6da696055e7a7f6a7774cdf19ea1"}, &(0x7f00000000c0)=0x1b) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='nfs4\x00', 0x10000, &(0x7f0000000280)='}\x00') ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:06 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:06 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:06 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$netrom(r0, &(0x7f0000000200)={{0x3, @rose}, [@rose, @bcast, @bcast, @remote, @rose, @netrom, @rose, @null]}, &(0x7f00000000c0)=0x48) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x6f, 0x5, 0x5, 0x8, 0x0, 0x1000000000, 0x8480, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xf}, 0x4000, 0x0, 0xffff8001, 0x5, 0x0, 0x588, 0xdd9f}, 0x0, 0x3, r2, 0x2) gettid() 08:33:06 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r3, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0xd4, r4, 0xe21, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5c78350d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x75}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2ef7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x50b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x963b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9412}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8084000}, 0x1000) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0xd0, r4, 0xefb95b5270551a38, 0x70bd2b, 0xffffffe0, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x20008890}, 0x20000040) setsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0xffffffffffffffff, 0x0) 08:33:07 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000200)={{0xec, 0x7}, 'port0\x00', 0x20, 0xc21, 0xf6, 0x81, 0x80000000, 0x1, 0x6, 0x0, 0x2, 0x81}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='\xc9\x05\x95\x18\xfaho\xf5\xd1\x9c\x97,v\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0xfffffffffffffe29, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) r2 = accept$ax25(r1, &(0x7f0000000140)={{0x3, @rose}, [@remote, @remote, @null, @rose, @rose, @netrom, @netrom]}, &(0x7f0000000040)=0x48) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f0000000780)=""/257) shutdown(r2, 0x1) [ 429.158855] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:07 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgrkup\x12\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 429.338029] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:07 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r3, 0x5502) gettid() [ 429.418479] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=34048 sclass=netlink_route_socket pig=21901 comm=syz-executor.4 08:33:07 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x8, 0x101, 0xfffffffffffff801, 0x8, 0x1, 0x3ff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x228080, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0x5, 0x1) 08:33:07 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x2, 0x87, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:07 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) getpgid(0xffffffffffffffff) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x800) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x400) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000180)={0x0, 0x0, 0x0, [], &(0x7f0000000140)=0x1}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f00000000c0)={0x18, 0x0, 0x2025, 0x7ff, 0x0, 0x427d, 0x20, 0x3}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:07 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x3, 0x1, 0x5, 0xcb67, 0x8000}, 0x14) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000000c0)) 08:33:07 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 429.724131] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:07 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000000)={0x51, 0x4, 0xfe01, {0x3, 0x2}, {0xadd2, 0x5}, @rumble={0x3ff, 0xffff}}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:07 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/s\xee$f\xff\xe2\xd8\x87Tls\x00', 0x0, 0x0) gettid() [ 429.821690] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:07 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) signalfd(r0, &(0x7f0000000000)={0xee7e}, 0x8) 08:33:07 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) gettid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000000c0)=0xb4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$SIOCAX25DELFWD(r3, 0x89eb, &(0x7f0000000380)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r10 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYRESHEX, @ANYRES16=r0, @ANYBLOB="f2406f7bf1239705aa7681dee51bdd3a62414eb06caccd0714fd81353e7024628562d6670fd5351875a104a7603ee36d3cbb2fd813", @ANYRES16, @ANYRES64=r4, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESOCT, @ANYRES32], @ANYPTR64=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRESOCT=r4, @ANYRESOCT=0x0, @ANYPTR, @ANYRESOCT=r7, @ANYRESHEX, @ANYRES16=r8, @ANYRES16=r9, @ANYRESDEC=r10, @ANYRES32], @ANYRES16=r9, @ANYBLOB="8f01105c28894e408ff98e272a401922d6c73f02c8fe1fafff1ef20f570c978f2e331903cdbf7c990a3c2269e6d0661e3eaf19da20ded63edddaa178748e0b5d6dd043698e36b975c9b79e3cdc8eff00b457d5870cf7941d8ead052d5b2eb4b90a37760690495a11640e32362b204495bc4adc5cee13fb66d100289e1ae1aa765c7329a2e37165655098b945a5f3c8ea19928e257ef950e586f9c3bf9a9738f5c15097163b93fa56cfbb309cce4446bb46db81fb74071032afde095a4e8ef8baf83a3fea", @ANYRESOCT=0x0, @ANYRES16=r3, @ANYRESHEX=0x0, @ANYRES32=r2], @ANYRES32=r1], 0x8}, 0x1, 0x0, 0x0, 0x24001002}, 0x28008801) ioctl$sock_inet_udp_SIOCINQ(r5, 0x541b, &(0x7f0000000140)) r11 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000180), &(0x7f0000000280)=0xb) shmat(r11, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$IPC_RMID(r11, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0385720, &(0x7f0000000300)={0x0, {r12, r13+10000000}, 0x800, 0x4}) shmctl$IPC_STAT(r11, 0x2, &(0x7f0000000200)=""/128) gettid() 08:33:07 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f1ec94d, 0x4, @perf_bp={0x0}, 0x1040, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() [ 430.102370] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:08 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000002d1201020000000002c300ffff000000"], 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0xa3c) 08:33:08 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x80010, r1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x1391778969b87867, 0x0, 0x1000, 0x7}, 0xc) 08:33:08 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400)='c\xdc\x00ou02\x00\xc9o4F\x11\xfd\xf9o\xbc\xf0\x1a\x82\xe0\x10\xe4\xd7\xa2\xe41\xe3+w?\x02$\xbe)\xf4\xc0\x17\xfc\xdb\x80u]e~\x1b\xa5_c|\xd2\xc2\x1f\x02hP\xb4\xb2\xe2@\xc3[5\xcf\xa6\xb5S(\xad,)^\x17\'\xdco\x8d=\xad\xe6\xc8\xde.\x93\xb9\xea\xae\xf62\xe5\x8a\x86\xd5\x99\xe2\xc1\x86\x14\xde\x19/\xd2\xfd\xefFk\xacJ\x9e]\x97|\x05\x9fEk\xd8\xfa\a\x85I0=|\xc2\xc1\bR\xd6l\xafFj\xeb\x1f\xcd2\'\xe1.D2\x16\x91<\xbe,\xfeS\xa0\xa6\xac\xe8?\x015\x8dz\x8cv;H.\x84\x15\xc4\x17\x81\r\x1c`\x1e\x16\xfce2\xd4Z\xf7\xeano,\x8d\xaa2\xcb\xf1Dl\xebrd\x19\x9e\x11\x91~i\xcf\xd8\xc8\xcb;\x03\xc5W\xd1\x80\x84\xb3\x7f\x1c\xf7:\xc0#?\x8c\xdf\x8f\x1f', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x3, 0x4) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:08 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:08 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6(0xa, 0x5, 0x3f) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20220400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=@deltclass={0x11c0, 0x29, 0x20, 0x70bd2c, 0x25dfdbfe, {0x0, r2, {0x6, 0xe}, {0xd, 0x6}, {0xff741a09c5e665de, 0x5}}, [@tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0xb4, 0x2, [@TCA_ATM_EXCESS={0x8, 0x4, {0xf467915d0327547c, 0x1813aafb7e371566}}, @TCA_ATM_HDR={0x34, 0x3, "69b5716b83fc23cd2305431b30d87b5d645bdb17b9014a24c827f79bbc389112560448a2009fbeba8e390f903166"}, @TCA_ATM_FD={0x8}, @TCA_ATM_FD={0x8, 0x1, r3}, @TCA_ATM_FD={0x8, 0x1, r0}, @TCA_ATM_HDR={0x18, 0x3, "3e9c3d48bd39bd24857ffeccc78e6d1646b1e586"}, @TCA_ATM_FD={0x8, 0x1, r0}, @TCA_ATM_EXCESS={0x8, 0x4, {0xe, 0x1}}, @TCA_ATM_FD={0x8}, @TCA_ATM_HDR={0x2c, 0x3, "8f92267cdbe2b1ae05193a2380e6a2ce5b175941319eada6cb4730fcf53ca00aa0ca653a6f"}]}}, @TCA_RATE={0x8, 0x5, {0x81, 0x3f}}, @TCA_RATE={0x8, 0x5, {0xff, 0x5}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x14, 0x2, [@TCA_ATM_EXCESS={0x8, 0x4, {0xe, 0x7}}, @TCA_ATM_EXCESS={0x8, 0x4, {0xfff1, 0x7}}]}}, @TCA_RATE={0x8, 0x5, {0x6, 0x9}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x14, 0x2, [@TCA_ATM_FD={0x8, 0x1, r4}, @TCA_ATM_FD={0x8, 0x1, r5}]}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x414, 0x2, [@TCA_HTB_CEIL64={0xc, 0x7, 0xa}, @TCA_HTB_CTAB={0x404, 0x3, [0x2, 0x1, 0x7, 0x7ff, 0x20, 0x0, 0x7, 0x1, 0x80000001, 0x7f, 0xfffffff9, 0xbb4c400, 0x1, 0x80, 0x101, 0xfffffff9, 0x710, 0x5, 0x4, 0x9754, 0x40, 0x8001, 0x34, 0x9, 0x7, 0x9, 0x3, 0x4, 0x0, 0x1, 0xfffffffc, 0x6, 0x0, 0x5d0cb0d7, 0x6, 0x3, 0x81, 0x4, 0x3f, 0x6, 0x4, 0x3, 0x572, 0xfffffffe, 0xffffffe0, 0x0, 0x9, 0x4, 0x2, 0x5d, 0xb76, 0x0, 0x5, 0x4, 0xdc, 0x1, 0x7, 0x10000, 0x1, 0x200, 0x9, 0x0, 0x7fffffff, 0x4, 0x7f, 0x80, 0x4, 0xfde, 0x8, 0x0, 0x4, 0x3, 0x8000, 0x1, 0x3, 0x4f, 0xffffff01, 0x20000, 0x0, 0xe8, 0x80000000, 0x4, 0xfffffffd, 0x1, 0x0, 0x7fffffff, 0x3f, 0xbe2, 0x3, 0x1, 0x40, 0x1, 0x8, 0x401, 0x6, 0x280, 0xbdf, 0xaed6, 0x400, 0x7, 0x1f, 0x401, 0x80000000, 0x6, 0x9, 0x7fff, 0x0, 0x10001, 0x1b76, 0x328, 0x2, 0x8000, 0x6, 0x10000, 0x9, 0x6, 0xfffffffd, 0x7, 0x4, 0x0, 0x80000000, 0x55d, 0x401, 0x9, 0x1, 0x9, 0x81, 0x9, 0x101, 0x9, 0x5, 0x956c, 0x0, 0x6, 0xe95a, 0x676d, 0x101, 0x6, 0x8, 0x7fff, 0x6, 0x1, 0x8, 0x7, 0x4, 0x8, 0xffffffc0, 0x1000, 0x15, 0xb7b, 0xfff, 0x7, 0xf1, 0x8, 0x1ff, 0x1, 0x8001, 0x81, 0x4, 0x1, 0x80000001, 0x45f5794c, 0x3, 0x3f, 0x80000000, 0x2, 0xdc, 0xffffffff, 0x80000000, 0x4, 0x9, 0x3, 0x1, 0xffffffff, 0x4, 0x6e049b83, 0x1, 0x0, 0x1, 0x6, 0x5, 0x0, 0x8000, 0x6e58, 0x8, 0x200, 0x8, 0x7ff, 0xf0000000, 0x5c1f, 0x1, 0x47, 0x9, 0xf21, 0xab60, 0x7ff, 0x4, 0x9, 0x3ff, 0x6, 0x4, 0x40, 0x101, 0x4, 0x5, 0xfffffffc, 0x1, 0x5, 0x5, 0x3, 0x6, 0xb716, 0xffffbc71, 0x1, 0x6, 0x2, 0xc00000, 0xfffffa12, 0x4, 0x98b, 0x6, 0x6b80592b, 0x6, 0x9, 0x2, 0x4, 0x2, 0x5, 0x58, 0x9, 0x1, 0xffffffc1, 0x80, 0x200, 0x101, 0x3, 0x2, 0x5, 0x2, 0x4, 0x7fffffff, 0x3, 0x6, 0x7, 0x3, 0x3, 0x6, 0x7, 0x8, 0x7, 0x5, 0x1f, 0x100, 0x7, 0x4, 0x7]}]}}, @tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x5}}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0xc58, 0x2, [@TCA_HTB_CTAB={0x404, 0x3, [0x1f, 0x40, 0x200, 0x7, 0x8001, 0xd4, 0x7fffffff, 0x3, 0x80, 0x1, 0xe85, 0xe7, 0x5, 0xc5e, 0x7, 0x0, 0x0, 0x4, 0x1000, 0x7, 0xffff, 0xdb4, 0xa33, 0x36, 0x8, 0xc0b, 0x3, 0x7, 0x3, 0x5, 0x80000000, 0x20, 0x7, 0x72, 0x7, 0x0, 0x80000001, 0x8, 0x7fff, 0x4, 0x8001, 0x2, 0x100, 0x9, 0x0, 0x7, 0x8, 0x8001, 0x0, 0x401, 0x1, 0xe7, 0xfa94, 0x5, 0x1d, 0x1, 0xa32f, 0x8000, 0xffff0000, 0x61, 0x8, 0x8, 0x9a, 0x568a1d10, 0x8, 0x1, 0x3ff, 0x1, 0x75a29ea5, 0x3b, 0x1ff, 0x7, 0x5, 0x6, 0x3, 0x1, 0x8001, 0x1ff, 0x1000, 0x3, 0x0, 0x7, 0x7fffffff, 0x10001, 0x2, 0xffffffff, 0x1, 0x5c, 0x6, 0x5, 0xbb, 0x5, 0x5, 0x2, 0xa1, 0xffffff81, 0x7, 0x9, 0x8, 0x60d0c610, 0x0, 0x2, 0x9139, 0x7fff, 0x3, 0x6, 0x5, 0x401, 0x1, 0x7, 0x3, 0x7ff, 0x1, 0x20, 0x10001, 0x7, 0x2, 0x1, 0x81, 0x101, 0x80000000, 0x0, 0x9, 0x0, 0x3, 0x5, 0x80000001, 0xfae1, 0xc00000, 0x9, 0x0, 0x800, 0x80, 0x40000000, 0x6, 0x8, 0x10001, 0x9, 0x4, 0x2, 0x100, 0x7f, 0x3, 0x3, 0x0, 0x1, 0x3, 0x10000, 0x1, 0x2, 0x7, 0xffffffff, 0xa0000, 0x6, 0x8, 0x3, 0x3, 0xffffff81, 0xfb, 0x0, 0x20, 0x80000000, 0x3, 0x5, 0xcd0c, 0x3, 0x4, 0x2, 0x8, 0x0, 0x72a4, 0xfff, 0x0, 0x7, 0x2, 0x6, 0x4, 0x610dfaef, 0xfffffffb, 0xfffffff8, 0x4, 0x1, 0x1000, 0xd287, 0x80, 0xc9a, 0x7, 0x3f, 0x4, 0x100, 0x3, 0x3f, 0x2, 0x3, 0x0, 0x1f, 0x3, 0x5, 0x200, 0x1000, 0x1ff, 0x8, 0x5, 0x3, 0x0, 0xffffffc1, 0x3, 0x4, 0x400, 0x2, 0x57, 0x2, 0x3, 0x5, 0x3, 0x1, 0x479, 0x7, 0x8, 0x4, 0x8001, 0x2, 0x8000, 0xc4, 0x7fff, 0x2, 0x5, 0x2eaf8a25, 0x2, 0x200, 0x7fff, 0x7f, 0x2, 0x10000000, 0x4, 0x7, 0x1000, 0x80000000, 0x9, 0x7f, 0x9, 0x2, 0x5, 0x3, 0xc0000000, 0xfff, 0x7, 0x800, 0x7, 0x9, 0x4, 0x20, 0x20, 0xfff, 0x1, 0x7f]}, @TCA_HTB_PARMS={0x30, 0x1, {{0x0, 0x1, 0x13, 0x7, 0xeaf3, 0x1}, {0xbd, 0x1, 0x6, 0x9, 0x1, 0x585}, 0xf0, 0x0, 0xffff9f84, 0x7, 0x1ff}}, @TCA_HTB_RATE64={0xc, 0x6, 0x200}, @TCA_HTB_CTAB={0x404, 0x3, [0x2e9, 0x5, 0x0, 0x3, 0x0, 0xfffffffa, 0x4, 0x8, 0x400, 0x1f, 0x8, 0x40, 0x3ff, 0x1, 0x0, 0x3, 0x6, 0x5, 0x0, 0xffff, 0x40, 0x7, 0x1, 0x1ff, 0x81, 0x401, 0x80, 0x6, 0x7, 0xad, 0x81, 0xda0, 0x81, 0xdc, 0x2, 0x7, 0x2, 0xfffffc00, 0xa0cf, 0xffffffcb, 0x3, 0x20, 0x41673f84, 0x3, 0x3, 0x4, 0xb6a, 0x4, 0x9, 0xe79, 0x9, 0xfffff560, 0x0, 0x6, 0x3ff, 0x4, 0x2, 0x4, 0x3, 0x8, 0x0, 0xc4, 0xd7c, 0xfff, 0x6, 0x6, 0x7, 0x9db, 0x1, 0xffffffff, 0x7, 0x80000001, 0x1, 0x7ff, 0x1, 0x1, 0x0, 0xf82, 0x80000000, 0x7, 0xeb9, 0x800, 0x8, 0x95, 0xffffff7f, 0x4, 0x2dde, 0x4, 0x200, 0x4, 0x16f, 0x5, 0x8, 0x3f, 0x10000, 0x40, 0x0, 0x101, 0x4000, 0x8902, 0x1f, 0x1f, 0x100, 0xffffff80, 0x0, 0x4, 0x3a48, 0x3f, 0x200, 0x2, 0x3, 0x8, 0x81, 0x7, 0x8, 0x2, 0x92, 0x1000, 0x80, 0x4, 0x7ff, 0x3ff, 0x2, 0x9, 0x1, 0xff, 0x6, 0xffffffff, 0xe8e9, 0xffffffff, 0x8, 0xba1, 0x6, 0x1, 0x2, 0x2, 0x2, 0xf3, 0x10001, 0xfffffffb, 0x800, 0x5, 0x98a5, 0x2, 0x8b1, 0x127, 0x8, 0x20, 0x2, 0x0, 0x3ff, 0x6, 0x6, 0x9, 0x1, 0x1, 0x1000, 0x80000001, 0x6, 0xffffffff, 0xff, 0x7f00000, 0x3, 0x3, 0x5, 0x7, 0x1, 0x4, 0x5, 0x3e0a, 0x7, 0x4, 0x5, 0x7, 0x2, 0xffff8000, 0x6, 0x7, 0x3, 0xffff3a9a, 0x6, 0x4, 0x80000001, 0xffffff00, 0x1000, 0x150e8730, 0x40, 0xfffffff8, 0x8, 0x7, 0x2, 0x9, 0x5, 0x3ff, 0x60, 0x401, 0x9f7, 0x5, 0x1, 0x6, 0xfff, 0x101, 0x15, 0x5, 0x13, 0x7ff, 0x3, 0x2, 0x4, 0x1000, 0x2, 0x5d56, 0xf3df, 0x5, 0xfffffff9, 0x9, 0x7, 0xee, 0x4, 0x7ff, 0x4, 0x3, 0x60, 0x20d, 0xffff5538, 0xfffffff9, 0x23, 0x4, 0x401, 0x1a37, 0x6, 0x8, 0x8e, 0x0, 0x4ce, 0x1a2, 0x4, 0x8, 0xfffffffd, 0x9, 0x8000, 0x0, 0x0, 0x0, 0xfffffffc, 0x6, 0x401, 0x6, 0xffff7fff, 0x199, 0x1, 0x4060, 0x0, 0x0, 0x7, 0x8]}, @TCA_HTB_CEIL64={0xc, 0x7, 0x8}, @TCA_HTB_RTAB={0x404, 0x4, [0x8, 0x9, 0x2, 0x4f, 0x5, 0x200, 0x7, 0x2e, 0x3, 0x7, 0x400, 0x3, 0x101, 0x6, 0x0, 0x1e, 0x40, 0x10001, 0x6e, 0x593, 0x6, 0x0, 0x8, 0xfffffffe, 0x20, 0x3, 0x5, 0x3, 0xd05e, 0x9, 0x3f, 0x6, 0x8, 0xb2, 0x3, 0x8, 0x7, 0x400, 0x8, 0x183a, 0xb6, 0x2, 0x1b, 0x1ff, 0x40, 0x800, 0xcb, 0x4, 0x6, 0x0, 0x5, 0xada8, 0x7, 0x3, 0x6, 0x2, 0x1, 0x2, 0x5, 0x4, 0x15, 0x8, 0x6b1, 0x1, 0x5, 0x34, 0x8, 0x8, 0x8000, 0x4, 0x9, 0xa2, 0x20, 0x65f, 0x7f, 0x80000001, 0x8001, 0x8, 0x8001, 0x0, 0x8ef5, 0x1, 0x5, 0x6, 0x9, 0x400, 0x5, 0x10000, 0x6, 0x2, 0x5, 0x0, 0x0, 0x9b, 0x1000, 0x7b8c, 0x1, 0x0, 0x7ff, 0xb615, 0xd34, 0x0, 0x6, 0x7f, 0x4, 0x0, 0x4b, 0x400, 0x8000, 0xdb, 0x9907, 0x8000, 0x9, 0x200, 0x7, 0x2, 0x85, 0x8, 0x9, 0x3, 0xa3, 0x10000, 0x4, 0x2, 0x3, 0x3ba5, 0x77b, 0x2, 0x76000, 0xb21, 0x2, 0xff, 0x0, 0x1000, 0x2, 0x8, 0x4, 0x2, 0x5, 0x6, 0x2, 0x800, 0x401, 0x6, 0x3411, 0xffffffff, 0x8000, 0xfffff954, 0x6, 0x6, 0x6, 0x8001, 0x9, 0x7, 0x6, 0x1, 0x40, 0x9, 0x6, 0x1, 0x5, 0x3, 0xc7, 0x4, 0xcfc, 0x100, 0x9, 0x4, 0x3, 0x8c53, 0x5, 0x1, 0x92, 0x9, 0x5, 0x0, 0x400, 0x1f, 0x808, 0x3, 0x3, 0x4, 0xffffffc1, 0xd4, 0x0, 0x10000, 0x7fffffff, 0x80000000, 0xe7, 0x7, 0x55b2cdf, 0x3ff, 0x8, 0xff, 0x4, 0x3, 0x4, 0x18000000, 0xb, 0x3, 0x0, 0x80000000, 0x3, 0x200, 0x200, 0x41b4, 0x10001, 0x7, 0x8, 0xfff, 0xffffffff, 0x4, 0x3, 0x1, 0x8, 0x7ff, 0x8000, 0x1f, 0x10001, 0x0, 0x5, 0x5, 0x3f, 0x3, 0x5, 0x200, 0x1, 0x7, 0x2, 0x7f, 0x3, 0x4, 0x8, 0x1ff, 0x2, 0x1, 0x8, 0x800, 0x4, 0x9, 0x3, 0x8, 0x10001, 0x4, 0x0, 0x5, 0x434d, 0xf943, 0x10001, 0x4, 0x4, 0x800, 0x6, 0x8, 0x5, 0x4]}]}}]}, 0x11c0}, 0x1, 0x0, 0x0, 0x40000c2}, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000180)) [ 430.407121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4653 sclass=netlink_route_socket pig=21981 comm=syz-executor.5 08:33:08 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000200)=""/4096) pipe(0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x600000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'netdevsim0\x00', 0x2}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) keyctl$session_to_parent(0x12) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0xe) ioctl$VIDIOC_S_MODULATOR(r3, 0x40445637, &(0x7f0000000140)={0x6, "79aa429d8b40486e624b46902f3028d7cf595db2f6ea4440b6b0eaeb682fbdb3", 0x0, 0x800, 0x0, 0x31, 0x3}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:08 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000008000000000000000e5ffffff00000000000000000000000000000000000000000000000000000000000000000000ff2100"/99], 0xb8}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="06c5f4fe84a1a8f02c7043aa4f00", 0x10) r3 = socket(0x18, 0x0, 0xffffffffffffffff) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000003a80)={0x0, @multicast2, @dev}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000240)={@rand_addr="de3dea45da7d07f2b782667552957564", r4}, 0x14) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r5, 0x400454cc, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f0000000640)="06c5f4fe84a1a8f02c7043aa4f00", 0x10) r6 = socket(0x18, 0x0, 0xffffffffffffffff) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @dev}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(r6, 0x29, 0x15, &(0x7f0000000240)={@rand_addr="de3dea45da7d07f2b782667552957564", r7}, 0x14) r8 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r8, 0x400454cc, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r8, 0x6, 0x21, &(0x7f0000000640)="06c5f4fe84a1a8f02c7043aa4f00", 0x10) r9 = socket(0x18, 0x0, 0xffffffffffffffff) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @dev}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(r9, 0x29, 0x15, &(0x7f0000000240)={@rand_addr="de3dea45da7d07f2b782667552957564", r10}, 0x14) r11 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) accept4$packet(r11, &(0x7f0000001a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001ac0)=0x14, 0x100000) r13 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r13, 0x400454cc, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r13, 0x6, 0x21, &(0x7f0000000640)="06c5f4fe84a1a8f02c7043aa4f00", 0x10) r14 = socket(0x18, 0x0, 0xffffffffffffffff) getsockopt$inet_pktinfo(r13, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @dev}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(r14, 0x29, 0x15, &(0x7f0000000240)={@rand_addr="de3dea45da7d07f2b782667552957564", r15}, 0x14) sendmmsg$inet(r1, &(0x7f0000003940)=[{{&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="a125512f9d0ec8103ab9b9bc4f5b8eb29959b53f6e3bede2d8bcfdaedec97b0090bac75146ccc06d36e49a74cb4065f394a1fd7549a2ff9ade52976ec3f90a60a58c58da787478657df48e62d78074be7fb1f3753e927cdf04e13d32aac97a59761bad9589759e7cb9e0ba620ced8037b99cb7a594fc1daafbc3652331b1bc706593aade89e29ddb17aee0b1178f045da722eb03050e91db6d6f3917d2ae72bc58d360c4945eec45d45de2ac5f01235e748d423d09c5840cec313f", 0xbb}, {&(0x7f0000000180)="76ade77e9c43533000574fee6a6d54b6c894ecff56e0d37d1418134917cef8322b7abf14c27bd34bb722442735d4576c91161d13f62de4a6d85f81c68a658890fcf1b5685e4494fb5cdb8c38358820e4daa01ca603e0c4d8ccc9451e2c24674b1c45d45bdd9e1e2ad3a6cc35189be2e16057c4482e300298909e65367f1397affdecd125a1b7e4e6fbdec0b7b3e0", 0x8e}, {&(0x7f0000000240)="9ff0e7da7b28116cebd222ab6cd0b04e2608b20ab5247ce7eb6e2b46b58e50c11a194b30349cf93231e13a4739e2742ac4b9b9f5126da028219bbdc8a68245f1d9e5fb34c4e048c22e49ebd34d06e6d896ccade41595165005171cb7f088a45c94d6036853c6ebf1fd97e2b19d96258a37d2756f7762c341ae2dbf65891b12899268af90821b72a2663b3323a0cc5a32844454ac6dad541e2e9d3d8ce9db9e7995196190231bf7bdde81c4aed48128bc1d4c8c", 0xb3}], 0x3, &(0x7f0000000300)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x67c}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @remote, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xeff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}], 0xd8}}, {{&(0x7f0000000400)={0x2, 0x4e21, @empty}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000440)="715de5544ce04b0e30eb4ab316e401382dd82040a06cf2fdde6235e153449d8db6493eb8dbf76eed01bb65d8ed647516d55f67d0c6082345b771505e323447c17f67138f6d61e254a7f47675bca74cbd514276d04a5e75e633804a49f403c98a7be2568d769c7ecdc46add6630c64e9497f7d9d963368900716ca59d7a813c097ee3de5b2f3cfd8aa966f142576849f2d81b03bd0092c1d32c7fcbad07becdd0699175558a361c948e8b", 0xaa}, {&(0x7f0000000500)="84b383bfb391e27764625c7363f8028e83f4f5", 0x13}, {&(0x7f0000000540)="23046f0f22e8e8a874dd32b4b3ea0af56d95aa0cc80c54d0413b0e5884410f7e92bf918466316ee00f485aa69a28d474461d55ac8fe4f9c2ed59149437ed65864fb221fa69ad8c1bcb4729d3e6d37ec05a61dd3feead76f1ae1c2f534624ef6a259a56916280940fbb9ddeea4645eaf7ffd42659fc8831108a105a2eca3602ba394449cd550d4660cc196a8731185502b32a7b92b9f281808cd57880c4786221d85733806eba432342d05c42f9db602f", 0xb0}, {&(0x7f0000000600)="2a9184e2fc8891330c10159368cf3b59fb8d5e0fe77d7ac13ccc0060e03cf1949b99aaf95216fea949fcb0fd75c109f21125a517dd40191bb60f4375ef6c00d0cf48885a3bce06ddf8a9b5cfd2a1cbe60b05246f78788a4726915247173b18d228d538ea6741ce61c0a3a7c21a1e3aad2bc138544e71867c2a3c3841a43849bc3cf7fd09d64cb6eca62ac903fbf9bdef3bd18cff86d2731fbc18db5edfa3758f851fe4d5c9ab1d28d0274c2b4cf08c", 0xaf}, {&(0x7f00000006c0)="5ae0046a16ac7fcc6f2c1e55262224121a5446024d2aefe7b1743832e18aec226820e5b4ba8e3c61019e54ee978568bf5c870ff81d8b14f88ffda94f94758ac2a43d359671d6b1ad9c98a2c24449305ed0f02476876ee9f94219180a57309c2c4ce9bae9ed0749e2707c632fd75f9fb2ffae6e1ab2c183bc3314ef4e9dd4e8428d216f0fbe4b669a3e27cdbf1f7ed844a6f061d243e3a532f1990266097f9e94b365c16b94557190a0", 0xa9}, {&(0x7f0000000780)="d754e77c71ca0cf2fac650a57430a24777155cd13b292dbfa9185399beab801bb0fb80584003015630534c93cdad962e6f6551ca83", 0x35}], 0x6}}, {{&(0x7f0000000840)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000000880)="35850115566814c1b98c81e31385b16d078c4aa6ded2dbbb314198e19b98c556fd2b2140796e30c0dbeebfdde6ab885581fb648f5df4c518bc25bb55888e1ad11b2b0e3ec94fc529c688ed061091ef154c78525721f071e8774f580b2cd464373896eb51c6c41dd59d07be3c19d5acb1f2e0abc15572b52fe33a19ed30b02c255d5d74ca441bd180e52ab6a878a4b4adf9607b878539f29b1235c81ac92f8ddbc40dad44873e0fdffd60ff25f39fed", 0xaf}, {&(0x7f0000000940)="32312e86dc809221fac41533102276afee529ea1658723095ee58fd3e2458c594886b436925105556d93dc12ae06cb8d402b68f3140496346c8a0dc121266f1e431a71e6628f08bd1a97fe3faed925beec6fc7ca132635b0fcb15a6925701eadfd8c5c7cf96708d1c799b63b5ae9586fce19089e75837d4b5fd28fc759fdaa4b9ca8bca3aa69027f27089a23a3865f58481a7c031e8f1cb81e7844c35fa7d1a2fd815e8568a187a52b639595b1d4eb16247080f218bd13c340e508757dbf173c0001fd45908d01bb5d", 0xc9}, {&(0x7f0000000a40)="e8c70539e2f9ec455966a41b6dfb771dd2954543112f59807cd31e39184e2de1641034095898129a328299bc845c8f53f23218faa41e1b38ebac779f23436f23fdbd82ac40baa0187f1f9aab2b51f5b25f5d0c3199db59e784d504873836442e86e1f3fa73fa4837f3c665f5a30a67c5553c273a9cfe76cf8e532b64f48b08e606c716d1f087fe171954290a2423169dd3613fe62981c4395ab3b5dee6d40541e6973a2b9ff753ad226e98aa183eae130c9613852f77315c38342ffe6610ce10209a01aba2ccfb0837781798ae976eebed26a4c8421984ec69fcea022b7d999073942cd3b754e97346222d09893fe94703b96135bd02425cad49ffaca5db7dcdcb7aea397c7a702e066c7cc0994391e79369c269c93fedb25d168b5f71f58992efeec05382db7f1fa9425b0c4028df1cf6b18986607a898482aad1f2c7b031f38a2ac8044b6ae3380e89b336dc3c191bd4f09e2e6e952c5548625ab4985c0121d7bdba81fcddf62b686900ba2fb1dbf8db7f416f82f9343bd306fb2e0f6d3af4a01949d57f243d86ae8bb42a89e72bf5788e9149021f0ddb98ac7523ce3a5726bf4a112d38c7222ac07ebd14c375a7e78772f082b1532ee5ff28c4053ef5515d19d82454b1976b4660ce689b8874d2ef3690b945c613b35e983f36312facd61dc412e5903709e397129eace6b385e6be0192412a5f14d0e3db4ff3f5a23f7a43305b292f4ec5a1b8df2b955f7f34a3d7cb75c687e1391d1b9808eca3c93366346ef3c10a8345430b417aceaad8b6b9e839c090bed4e160e7c031e88770d6be91f1e1c8adf7e06ca141956e11d7cf25afb2a267c90649b074c50f44101b3b7a02e2da2a80275bdb86bbec7ec7af1079d4b71c00ccb0555e72ff86a318085c9340090f899a07949367bd6dc2808a9fc02d27b913eef49a5c2932262bd76ef80b29b3fb3bd203a2388cfa3257a174c3ecb683cc7bab0892afa6ffc405f64a07a32dc97b6c647cf98b22ab651d6810a6baa6994112c0522866f9998c335c27915ad8b74d61a9ccc42bcdb3c1495a554649a97f04f90e11fc423e4bc87c92bbb9c7cd563bbde022b2c1f35273fa0c34515287da44e158a77f22d9ec0f29fb6f4d44c372cd206853dc415493b0a19a3a381f545b12bb04240731ac082b7cf92771472c7c66934712be54a70aed3a71c6591dc14a521785af3a3c1aea404213ed559df1299ddbe4437677b6e141d0de54ad230d6ba543f3c0150d399c474cf0bc39a268c2787083a72f7408b55a93e341e87989f29296ea14901915118e5f8a30bc924b57efbe5f58d8d36bb2e65c07148814e019522aaa6830f881ef55e6f0fd76e5c4733d4d7889ffbe1810007f34a825007fad0aeaef5db1345f28a7932dd54b9b5bc0e31792e590af15844eb7bd435387d367499663c9da9fc37929e41894ac6c09f4903131d6342602bc08dc400863a14e3f47be6e345198c01b1679380185ae6c5ffe9893ef12c683a854aab170423d7b532b12e77c073bda94cae1d1471155e46740a2f30d089f444ab412307f0e3048bebe91f35be3a130f6fee3dcb0409d4e1d7381654a50f21c4580a0c148902d6967f024bc1d619110bfcde59912bbe192002dafc63903204fb36af124a67622dc2953364564081735399de203b9ff796a6bba408ecb80325aab80a0375a566b45edbfb8c4a8094d987af6f678438e8af6ba44d2510543b6b46d6d1c9600774b9ce0740afecde772bd9eb31887913b660a8e37a4f284f118f1cceb271ecc9678c215d4d10c2c42b9e13baf2526b54f7c3acea21b9a0602679af5d1ca59dc8163efd5703c3ac486db26c7c1fe2748ac916acaacac3b68bf734426397e89dfbb2c47ae72bfebbc560b600fdbb1d242ca1af4c8b4d5dfaba7d5ee9bde24371791bad5e8604fb4ef4f46ea0cc747cdea46db86847c9fb3a51dd7f3a3f00a172e03c77792fecb28e56c2adf2b6f7c0f0e8d549f36875978995fb625c0606820d1310f3da4bc31d3ce6bb0297a30631995eea29e42bc9a4903b9af2222730fa95dd7c1c4bd833fefc8089a1c9bed948e8cf74895e3c8a3fc3b20bf2eda4bd54a25679bf69bfd389366137c52fbb95dd9cfa2df0e1551f7b12d42ef281832975a700bc5589d2521b9829d062a802c7558da5fe1d0b1d33329e400ad6bc798b73aaec92f968cf84d83cbff8356efdcc2c8cfc245d72d23e8c539839eeb2646f6a64d492b3f75b49b0aec9d1f9cebb96653d57a17ed2ac504a47b6b6b90aec798f425ca9d823e5f189eba4b6a4e177ff6b9e3839baf66199226e9165202f3e90750318b951bcd42ebd3043edef30a1d290c9ddd6f27752a92bb3aacf0d233d621ec514b08a7cb496ed57fd4394af0a231af312715777d47af3fdc6daffade8d60e328c536615dd4aff62da5e9a6200650bfeafa25de383ee88a40ba24e09d3baedc1fb961af850785c15dcd307ffbc0e4e70607f99c244bc4719787622fbdedde044ff17e08614b965cba457729c6fb35515aea763012ddb3ec39b5f7b1aa2164cfae45a5cf8f6a98dc3331992862be11fbc839c0e9da5f4a52c681b3f0c40c72c23f1a5f264b3821b6adac413d9f3fce88e1b353ba761aa61ffb048fec8713d732ea4d3c2cc1fcd131e6354da740d4ed4e43a1056c2559fa1fa121e56020e2d8d33b4773701fa25457acc43d19c4f11050fcc2f660c7797e53937882042c89a708c7c9241d9934164e12460cffade4a864b66c40d15ca0291a7d54c3d52814d94940ecfcfed8ccfb9f8f2258bcc2265b4b2a044bbbdefc87551304998d972a1d7fc2b271b7dd0467cef76a9a504f194bbd6973599736df7f1e2013f2f0df64e0b61816449d58561f92dc47b0dd5f210673f2f290c1c5fc959a1569679a9dd5a492281bae33b452cd7cf5d4d2939f3eaff1c7f6db88983266d3fcf35f737337093662642f5ce712f3b06543d4aeaa22e542651e28747843e94ff89dd4596f36993e93a60bf0df97d329bc012e0f19fd6bb191cb1deefff525b63193a0153ff70e9c187338926472ddc51e2478d53ce2aba895811ea19407678eda4bb0635fba985d9927016b1463836af0b2146ebd92dc7c83deb64fe39dd992ba7ed6bac745d9ce2e54ef7e30753fe365e8a3db541fcebdcddb9b63186af2e4b5e2244ba6c9768cd6c01f19fdc9d08c94f2f7a3aac036ba5c32d9e7e26fbfa27ae73dcd2770059d09721b24e1a5b4fff35a5de393111312de2e8dc2e40895fb008c428e6ac0042f392954ee9575f2c33fff0f87a0ed958e8d4df9e6729cdc0e3619b56fcf4d1bceaa29a561901df4c3a02c725b34571e0f3e5c0053a8ab848a38c772929b88263534e4278ac00e9fa39470c69a55a587f42809d71ecd93840ddeb4b3d9317dcd1af7379bac5897d159e7cabb03d350f3d6d5d85c12f1afc4a446d2153ce2afa5eac3f5a86ad9b5bd143a1b894fa32d427a10ece17785bb837e6f809f9b8294c5c6c9bf0b784bb5cebfc70725168eb5941d7033c014d82b94e0054b48c4be2df30a04414cba056cc19fa9f2fbe93db61a724ecc20e7937b1c630417f7242d51c9fe848150721cf8bed1e886e6eab2d0d4bc0a494377c50ac03254b62f86f76c5a54ffdb2c658ee0a7241e584904b4c50c2e3385e432ea1dcb06c8d98ca6b2bd6d5840ff04d6ead96bd379d16a05881b0b844204c1dc40103b15d6931d51bf150e372582fa59aac73e60d2e8a4d2b3a2fc1928c4a5ec8655a9b50dfc0a6370f938af0fd73d8b709b0f79e1b1485217e06e9511d3bf33dfbe6bce4c473e2e3adc87563a05354425e5602ae71b80c05ec8f20a09ec6920adc305b6b20f75f8863d6cd6211cddc10f58e540809e8fb898ee465792e7ad0a6d716b0053681c650e9c51ac91a8c52586b5f0b3057d2185a769d6888b23e2e1c26dfa9beb59565ba3d514b39a5038344a17e60d161885b4b70acd4cdd3ad13310f68a7850be41ae308c9e0310f9c874ec04ee251af89284a5c62a28309a3e44d081c55d0743a4efce2b51e3ee529ee2fbbaa95ff8c07d3667e978c98a19e7e646aa7be5bab69e92768db814f65d28a282f50f2e6f3476b163d327ec65b345df613fc33fed14770f93b7d135437cb23b627819e9b51d84ab510588c5fc08beaf284ca94693972017a032af19beb7344f51d4810cfbbea3728659ecc6b23b59ddefa96f98f15aad1c4885fd26ee3076292f4d679a2678aaca9e0e3195e0f93aaa559465c4f43477c13566083e8e2e9406a23fcb53ca0e6befb601732785edbab7d44b5936851ab903344c53997d338dbc967f8235b774a9f989e64f25a07cc8bdf0cd96568db5b408497cd1970ce8b21de9deb5517f75d4cf63c4aa0e36d10ea09f81e5f37162bd50b298d12e697c5543b191216e50022ce1a6e89da0af0e3a325e181eae76efe4aa8831e7fc4ada8c03df047c636ca1a051624b49c35e3ad5edac432764e59fba6e1dbd2727c89218d3bf0964e19837182cd49fe605ba27ae9d592d7fe1c241c43669be5dc8c401dfa888941f2217fe9ca832acb7f11d7f9474608de9589f1810638794901249ac9403a52e0a4181962d60bf459f25eb941dfc7fd803749631db1ac4d6bd406c1d84aa46640e47753d878fa2a4fb1a114e6274c40d0d179b083da5cc3e57ad2dba31e09c3575415206da18cb26575c85e7543a809b3534442c6d2f37f6bd70417d3dd715d60d16f41d6d4df690d4637fbaf3208f55de08b99cdbe36cb4713bb6fbf694568f34ea7092e864b988215c524c5d17b1ab2d0cc7a75ed0b6ba9c38f0e8438449442634c7fca49bb4567ec5371c0e9cf96a7ccc22ad4fd1de014e5abc26aec1f29a69425d7724603547e557c106d7e85584666b243c26e6572682d5585909aa57038c77a13f782c1fe187e7e2ace825530479dad8b6901336ebc0ae4f4621176a70bc598d16c97336af81f6c58e8cf643696df755f9a5c018907ae2a19dd0807598c1b8921bdc2d1f4c9cba492accadf7efaba2de955528c252bdb9d1459eb348461908d53f7bc3ffb90409e9869821890ccd679b0022239ec84d468dfb108388e7355caceef60b3d688b9e697c28926c7b9a024b6cdfa3b3fece629213c095605aa9a917258c92e4dfdcf62971b2cbe0b0c6ba052a961cb10d219f90df08f49733e0e48170a1e8b706df3db4b8a53452df9ab4ea7b04ee1885ed8aadea39f87bafbcfc42f77db396880f842bcac74e43d88ddaa41ac7d6f906764fd4174a887a77f2b76e501ecdcff5c632e4928b67c376b1026786ea015d07ded2c26eafc82acf67e67c7908f35e80ae1ee82434ce5a91d4a1f84785e7315ed64a89de624bffa74a052e6e257960ff963409503b29adf47984fa565145eb7c1461bc29d355411712c3a17b3d87d47a43db3865bafe40319eb921e6a2035890cb4db67d8a3e50934d4ffdc860e1693eee38daabf78f5b8b5ccc8d8808bae1fba9f7bbee276ef77ac2103fd2fb8148ae18dfb0f48884a36d7144b254cb59d03b8d09b15b514f0056f218c0e04261430969a786e41a8890cd672410eea0d8de747721baf190bb0a60f58fd258c9fa7eece96d45a10bc84d5ab876981edaea6707c4c680225f1edd77c3fe6d8d7e815e1a63c89b322ffb33a784ba5ecd20d5876b2db71a2816d4ace9ab78ff0c229e57dbcc15eed10ba932a69c8a94cb4ae6f4adda6a4597e62669c3d331191da8bb2f17b6985060c6b8d066136f4255557ca0e2d5ee8e13fb932d396c1bc4738271267364f70da44f26", 0x1000}], 0x3, &(0x7f0000001b00)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=r12, @ANYBLOB="e0000002ac1e0001000000001400000000000000000000000100000000001c0000000000001a0000000008000000", @ANYRES32=0x0, @ANYBLOB="ffffffffffffffff000000001c000000000000000000000008000000", @ANYRES32=r15, @ANYBLOB="ac1414aae0000002000000008000000000000000000000000700000000008327e7ffffffffe0000001ffffffffe00000017f000001ac1e0101ac1e0001e0000001ac141417861a000000010006bf824d140407748994d1930107e022bc3b3e070f027f00000100000005ac1414bb831b07ac1414bbac1414bbe000000200"/140], 0xf8}}, {{&(0x7f0000001c00)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000002180)=[{&(0x7f0000001c40)="b089b8ead9374a1d5e53c2f861a3fcfcd15919a4b63d318d1fcafb94905b7dea3086719004281cd5e43a01b702fce03e4a5c39b5388eb7748ee68173cc30f8e9f8c1f088077843bcd67fd24d01e14e325966007ed9d4498e6846a1c035f0a988eeea0058892a9dbf37e05d261af23898c67106039c04d99445c0eb89188519b432e8f3f3c2d1dc42b9fde6e23f82ce8a65b32ed66e25d8fd62ee4b2eddb866939d8773c15b66340558e1b5eb10e4868f14c9b8e15cd5a3d0ff59a8394201dc76993b8b8533f0777ec71956e14778671430db84d1e0667af74a97482507eb3d1a200dedee2afa88", 0xe7}, {&(0x7f0000001d40)="9b08e169b8cc18122b85a34133b0a908be55fa03eecc7a7ca26ea01c3d78e01b71e19b4b64848d5da14b5aeead7e4692adc2f4f5ae8a66de16dfc3fd2056a3632854d94eba65a0141c4cf451762b804fd25d6914073fe8188fc0fac32f8dc2f06cf9dc2b14897e0f43112d5dea3b77fbe9d11f981e02801fc60271e7541c18d520909fd37975cf37b14e217f691e4b1cb8fe8bd678fabcaffe671c270899e94884078ccc4a4c2a8fe5df39ccb2250ed5ad05a6", 0xb3}, {&(0x7f0000001e00)="3af08c0a804210a10d8691d9e00da8819cf029d55d8e4ac905636fc14d34848d298a6125e74f962dd19a796c3067e7a079cb80676f4fdaf33260eb38ce7d4f6aded424ada1fb72b6fd139f1db3feae3d4e6883fa683fd537e13287f6380622cffdfb5eed0dcf1bea659cfb67e722b5db1833eb82d4609f8a8c9f292d90fe", 0x7e}, {&(0x7f0000001e80)="a5d22bdf2c82a9a2ba5734ac4dd5d146a21c3728f844486a59f633fd9d5c664b815b81b72ec124190522a76d7edace2b8896b753f95e7986b7bc5547c312c41336f91c49787b498f3af44b751c95f05b9ac37d40a27573e71469b1ec1cbdaafb40c8b5773d544e594dd3bafb6b15c256f56536f6d49b967f6abb513885b6420e1a17ed577d8988a4e123afe7f5d392e53b6f66dec9d079e8af46c6c98996976c9d48b300fb4d81aa628a89b386cc4aff308efd2ac1e3dbedbc2491f149", 0xbd}, {&(0x7f0000001f40)="6dbf42394b9193f018432bbb9c08b41e0cab93d379f8d4a449427dd519914bc4c129df609d452e18971e97dabe953699b6ddbbc2b09f1a430ed63d69c4984f16a3b81f734cde66a3e38170a5f81390844276b2915923cc41ebdf5e1fe968f5de34904731b0d9e1fb0561d89db66a75787707fec3ebde6b2cd85b1dab5c4b544bcdf737d491713f94f8", 0x89}, {&(0x7f0000002000)="ab48a022b581540af7f6c1db3dfde94024a6fbce717a867a60f919d70f6842ffa6825ebf178dbc07ed68d59d2baa3dcf02aafddbe6b560fa25615e87ec64987d4c0e3451512c444a42b801848eb3424706f754b1ab3de14e32e6e94e083fe69943ff66cf1deb6932691a999d6360155f2c8088fafd98aa24325acd2472c4b15e3b9646aa6f4cf90feb70a0689e1eeaccf41b43a4aa172bd6e41b065a3522228a", 0xa0}, {&(0x7f00000020c0)="3bee96876daa674a9287586ccb5f4cbfc1fadcc50a59dd70b4bc7a06a55164121b960a286e4d3f11c78e1b4feef4", 0x2e}, {&(0x7f0000002100)="a8ef17ad041020e0e108935dce26b65e622ef88707e8ba1483fc9adfc0866871d76414ceded54407283f433f613763883650cb98731bfedfbd25295700540545f4e061808da1997b3271a93616f5ed9deba9a27fbfa96372ce4366e05c0ccddf1a9945eb", 0x64}], 0x8, &(0x7f0000002200)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_retopts={{0xf0, 0x0, 0x7, {[@end, @lsrr={0x83, 0x13, 0x3, [@multicast1, @local, @dev={0xac, 0x14, 0x14, 0xb}, @broadcast]}, @lsrr={0x83, 0x1f, 0x74, [@rand_addr=0x3df8, @rand_addr=0xc458235a, @multicast2, @multicast1, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x43, 0x0, [{0x0, 0x12, "76987415818b4e05dfa086007e1410f5"}, {0x7, 0xe, "ebac211507cb84a19683ba2c"}, {0x1, 0x12, "2dd94e6c50c16cee7fdad9437300e130"}, {0x7, 0x3, "81"}, {0x5, 0x5, "b46922"}, {0x7, 0x3, "88"}]}, @noop, @rr={0x7, 0x13, 0x0, [@multicast1, @rand_addr=0x100, @multicast2, @rand_addr=0x5]}, @cipso={0x86, 0x25, 0x4, [{0x6, 0xc, "1876d9bee2602ecb226a"}, {0x0, 0x10, "a35ae2855b9191939f0cd3212e33"}, {0x7, 0x3, "a6"}]}, @rr={0x7, 0x23, 0x0, [@dev={0xac, 0x14, 0x14, 0x13}, @rand_addr=0x1ff, @broadcast, @dev={0xac, 0x14, 0x14, 0x21}, @multicast2, @rand_addr=0xf781, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x82, 0xb, "85b5ac123454db510f"}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4e}}], 0x120}}, {{0x0, 0x0, &(0x7f0000003840)=[{&(0x7f0000002340)="b5e01e50c69c7841494549cff68d07a7e62f99f9a334ce950bd7f438abbcf55e28db90ab0cf587952eab87e425b7ed", 0x2f}, {&(0x7f0000002380)="54ca740d3171377321a44888fb1c39e1bb593ef28baca7e608165dccd3e92fe4a04acf47f485cb063b4e2c163b12a7acac33ea8b45e95c481e56da0e10ae39fc17c889aa9fe636a434b81afb149d7fa3deadd5cde30cfa6ceacbe41169c4115887a14dfeaf1dc0855cf58137d35576cbc43ac38defef5fba556a354f27bbe23c13b627656e85a2a3b3435ca9fbe83b050e3c679a7a1ddfac6b8754f44942", 0x9e}, {&(0x7f0000002440)="77f105d8f2e2aaa97527b74e1f050d4d0399f7e3993041f277b16e0b7b6388e04f4c21ccdb16df5394c7ac793fa56392391472aa6a973000f83d5b3e188854c834940847d4d05a67b51b6303c46d7277d5727d5d2d73012ae3add43b7922cfa98d63c6218bec1ca52e7bf91a945cb7123b3b9269b2e6264a9f037d177add02bbf33902eec2c1258b6ad8b9704a81a3f921d61d4dd4255106b9623c0b30b904b062d4e777f10a7250e9da7ba49369650ec4e49ab6917ee0f0240912019a8bb46e0c87243934cd665a6aa6", 0xca}, {&(0x7f0000002540)="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", 0x1000}, {&(0x7f0000003540)="9213b85093e0bc630fcd18a89fdb0610dcb7582453e47e166a1f3660df7f05b2af40d2a7e8df28170dc6114a6989cbc472052a411c64fba765b97cbe020ea3d17b908f6228ed616e", 0x48}, {&(0x7f00000035c0)="16f9c62de4f38fe3bd368c5615731eeeec69b6b53ca04c28c8b39dd8b155a1864816b3e3afbf2b4abc347e964e69f0f5591cf312a1af578c56f7567c867f35f811f1458ff9009a9f5d65f0f30311852815d1f8cb96da996dc90c16938b91ac5d6b5b70283e4126af0667310a1555c14e3abe81d73994a50c112312d9d6a353f232f28e500885da33430e857eb43b918064c12395d5955e52cd73bef309aaf66aed2c3bf9d8f5615b1ecf496ad945d775df6205f9", 0xb4}, {&(0x7f0000003680)="a015ad20d0021282c7a43f87e9317a644736a5ea7275371e6bfd75370c2ecd17d9f533878044d8d4472957ec725519bb3605e2cccab4cc85ae38f1fe655ea19be84a97eb1c5a813fb2d922afb52addb768624b030647ffa4da6eb65befb1c5d173b406ba0adeeca09b1a17deda08b3a228944f0293d3a57b993a901696258cc528edf701f22ab4bea7b8bf80965114475453b79a387af548a85c0dc7a97882a40b8bea3ae10558084bf38178edc1354949672c73089b434d2841c3d25a84e9305df1", 0xc2}, {&(0x7f0000003780)="b441c2e2a7783afe7899a6010772b26fb8cca0012fb4709e56e59fecd780887aa8ed9e6272989a4cb80b68901bfab0413fe51dc4c2abdcf56bdccfcd10e7845d793ec37ca6aed32906c5a032048e258d3d2ae77b72bf09d93ee07c6a1a230e9fca51a31d4a838037b2b6647344ea4068df8e08f107576d157f320658cae1429d4cc542939298aea7f2", 0x89}], 0x8, &(0x7f00000038c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x341f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x48}}], 0x5, 0x4000) 08:33:08 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0x1c, 0x1, 0x6}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 430.458987] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4653 sclass=netlink_route_socket pig=21976 comm=syz-executor.5 [ 430.599654] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:08 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x9}, 0x80, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r1, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000180)={{0x1, 0x0, @descriptor="a4013d6bb77100bb"}}) io_setup(0x0, 0x0) restart_syscall() io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="d3e5f190123794868e140800002d00010200000000000000008c8e790bc895ff37d33580377d1a931c0d8ef0de70139100310f601e6c467d012d546340a0e13ce1c15ed9aa00000000000000000000efffffff0000"], 0x14}}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) gettid() 08:33:08 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ftruncate(r0, 0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r2 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={'eql\x00', {0x2, 0x4e21, @rand_addr=0x6}}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x400, 0x1}, 0xc) getpgid(r1) gettid() 08:33:08 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000480)={@remote, 0x35, r2}) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:08 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000300ff0100020012000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRESDEC=r0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0x4}}, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 08:33:08 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) execveat(r0, &(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)=[&(0x7f0000000200)='-lop\x00', &(0x7f0000000240)='/selinux/mls\x00', &(0x7f0000000280)='/selinux/mls\x00', &(0x7f00000002c0)='cgroup2\x00', &(0x7f0000000300)='\x00', &(0x7f0000000380)='\x00'], &(0x7f0000000640)=[&(0x7f0000000400)='/selinux/mls\x00', &(0x7f0000000440)='/selinux/mls\x00', &(0x7f0000000480)='++\x00', &(0x7f00000004c0)='cgroup2\x00', &(0x7f0000000500)='/selinux/mls\x00', &(0x7f0000000540)='/selinux/mls\x00', &(0x7f0000000580)='/@\x00', &(0x7f00000005c0)='systemposix_acl_accesskeyring\x00', &(0x7f0000000600)='/selinux/mls\x00'], 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0xc051}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000140)={0x7}, 0x8) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:08 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() 08:33:08 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x188) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x70301, 0x0) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:08 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[]}}, 0x0) 08:33:08 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffe, 0x200) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0xc, @dev={0xac, 0x14, 0x14, 0xe}, 0x4e24, 0x0, 'sed\x00', 0x37, 0xffffffc0, 0x47}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x1004, 0x6, 0xfff, 0x3ff}}, 0x44) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x3}) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:09 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff210000000000000000000000000000000000000000000000000000d026fdf95eef39eeedc5b2f27544699ff185fd51c7748b8b2d16b4346a6331265279329d328e3bd2"], 0xb8}}, 0x0) 08:33:09 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getpeername$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r5 = syz_open_dev$swradio(&(0x7f0000000480)='/dev/swradio#\x00', 0x1, 0x2) sendmsg$nl_route(r1, &(0x7f00000006c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40008040}, 0xc, &(0x7f0000000680)={&(0x7f0000000540)=@bridge_getneigh={0x11c, 0x1e, 0x400, 0x70bd27, 0x25dfdbff, {0x7, 0x0, 0x0, r3, 0x10000, 0x18040}, [@IFLA_CARRIER={0x8, 0x21, 0x5}, @IFLA_XDP={0xec, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0xb, 0x7, &(0x7f0000000140)=@raw=[@call={0x85, 0x0, 0x0, 0x48}, @exit, @generic={0x7f, 0x1, 0xe, 0x40, 0x7}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8}, @generic={0x20, 0x1, 0x0, 0x0, 0xaa}], &(0x7f0000000180)='GPL\x00', 0x5, 0xfc, &(0x7f0000000200)=""/252, 0x41100, 0x6, [], 0x0, 0x16, r4, 0x8, &(0x7f0000000340)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x5, 0x0, 0x7}, 0x10}}, @IFLA_XDP_FD={0x74, 0x1, {0xf, 0x6, &(0x7f00000003c0)=@raw=[@map={0x18, 0xa, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2e}, @ldst={0x2, 0x2, 0x1, 0x1, 0x17, 0x0, 0xe}, @call={0x85, 0x0, 0x0, 0x2f}, @call={0x85, 0x0, 0x0, 0x51}], &(0x7f0000000400)='syzkaller\x00', 0x80, 0x16, &(0x7f0000000440)=""/22, 0x41100, 0x509499331296eef8, [], 0x0, 0x16, r5, 0x8, &(0x7f00000004c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x10, 0x3}, 0x10}}]}, @IFLA_CARRIER={0x8, 0x21, 0x4}]}, 0x11c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:09 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x2, &(0x7f0000000140)=0x2) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:09 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() 08:33:09 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r2 = getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000200)=""/161, 0xa1, 0x2020, &(0x7f0000000140)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) pipe(0x0) r3 = dup3(r0, r1, 0x100000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000000)={0x2, 0x3, 0xffffff54}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() process_vm_writev(r2, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/236, 0xec}, {&(0x7f00000000c0)=""/25, 0x19}, {&(0x7f00000003c0)=""/132, 0x84}, {&(0x7f0000000480)=""/107, 0x6b}, {&(0x7f0000000500)=""/124, 0x7c}, {&(0x7f0000000580)=""/30, 0x1e}], 0x6, &(0x7f0000000c00)=[{&(0x7f0000000640)=""/130, 0x82}, {&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/180, 0xb4}, {&(0x7f0000000880)=""/118, 0x76}, {&(0x7f0000000900)=""/198, 0xc6}, {&(0x7f0000000a00)=""/249, 0xf9}, {&(0x7f0000000b00)=""/197, 0xc5}], 0x7, 0x0) 08:33:09 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff8, 0x10002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000240)={0x0, 0x0, {0x3, 0x81, 0x2ec94199, 0x2}}) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f00000000c0)={0x7f, 0x0, 0xfffff000, 0x400000, [], [], [], 0x7f, 0x8, 0x1ff, 0xfffffff8, "404cb860b07720ada0ccd4dd71ac86cc"}) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x7, 0xfffffffe, 0x1, 0x9}, 0x10) 08:33:09 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) move_pages(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000003000/0x4000)=nil], &(0x7f00000000c0)=[0x0, 0x40], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x3) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:09 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x6, &(0x7f0000000000)={r3, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={r3, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2d7}, @in6={0xa, 0x4e23, 0x7f, @empty, 0x77ff}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e23, 0x4, @empty, 0x7fff}]}, &(0x7f00000000c0)=0x10) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000002d000102000009000000b2f71f836286a82bf19dd4fc2d840000000000008326037f7344e6e53a55ee86089ad87aaa9b3549236b949bba2325c9c3ff65f3f21b8327bec36eb3606b59358867d85292d0dd61f51bdd2d6f5ce42d793c9eeb8a7eccc3fd68ffd0840dbd00ab149b972a53de1e2c3fd6f3f15db3221dd79faba9a8cc1bde14fb600dce1fc65418fa6e5093d30a747d7468a65a9c1b76ad02dcbb41a1989645954ca20b892978014d42a0533321738f81178e94261e1a72c58393"], 0x14}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000200)=[@window={0x3, 0x3, 0x9}, @window={0x3, 0x1, 0x1}, @window={0x3, 0x1da, 0x1fe0}, @window={0x3, 0x2, 0x6}, @window={0x3, 0xff, 0x6}, @timestamp, @sack_perm, @mss={0x2, 0x680c}], 0x8) 08:33:09 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRESOCT=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0x4}}, 0xc080) 08:33:09 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000200)={0x0, 0x0, 0x2080}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:09 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffff3adc, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000140)=[{&(0x7f0000000200)="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", 0x1000, 0x3f}], 0x1000, 0x0) 08:33:09 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10000, 0x800) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f00000000c0)={0x0, 0xfff, 0xffffffff, [], &(0x7f0000000040)=0x9}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:09 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000140)) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbff, 0x40}, 0xc) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:09 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x74) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x217, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000460}, 0x0) 08:33:09 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() 08:33:09 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VFIO_IOMMU_UNMAP_DMA(r2, 0x3b72, &(0x7f0000000040)={0x20, 0x3, 0x3, 0xe0fc, 0x1f}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:09 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x163, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRESHEX=r0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}, 0x1, 0x0, 0x0, 0x40}, 0x20000080) 08:33:09 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) io_setup(0x401, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x5, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:10 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000140)={&(0x7f0000000040)=[0x9, 0x0], 0x2, 0x0, 0x9, 0x9, 0xffff, 0xfffffff7, {0x3, 0x5, 0x1c, 0x8001, 0x1ff, 0x4, 0x0, 0x4f, 0x1ff, 0x3, 0xac57, 0x3, 0xbd, 0xff, "e85afbbc57365053ec4b785fc7ec83b00477f9f4b322c7cc77f07ac6df13d119"}}) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000200)=""/90) 08:33:10 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x7f, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x0, @remote}}, 0x1e) gettid() 08:33:10 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bdev\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "22c259dcd8f7e7ee936c6d614fbeff4e210a119a"}, 0x15, 0x5) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:10 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="ecf900000501000029bd7000fcdbdf250c0000000000000000008800", @ANYRES32=r2, @ANYBLOB="4785a2ea47a50f2794b1dfa1726a8b7f78170700d40dacf03234baeaaf533d45a48dbce89a8a5c511b92efa469b7ee6c17bcce92f49b3d797836cb3be3843431238f23c64374776c09ef57c7d5d349a97084fe3344825e7e180fec6f38a6525763c4c9853d7327b892f706995b0504d82ea6be6da1b178fe0f6a84aafdea90a3f71bca55b6cdfcacfc9032482ee23022ae42fdaccdc81b4e1c75dd605679557bf321599531ab69de6648fb3eefee25f2dbf1cab0cff609f6c2bb3fb6358a88677173f5cc57387cc2867e0800"], 0xec}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r3 = socket(0x10, 0x3, 0x0) r4 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r4, 0x89e4) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)={0x0}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x10e, 0x2, &(0x7f0000000400)=0x1f, 0x4) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f00000003c0)={r5, 0x2}) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x400, 0x0, 0x20000000}, 0x14}}, 0x4) r6 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f0000000500)={'team_slave_1\x00', 0x9}) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000240), &(0x7f0000000280)=0x4) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000002d00010200000000000000000013e22aefb6da9fe636b7ff52f3ffa3000000"], 0x14}}, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r7, 0x400442c8, &(0x7f0000000440)={r3, 0x400, 0x1, "fa70bf896586bad7e898ae9044613cb87f6807779535b5217de8dc41ceb539aea90776e7768eea0325d938b96b7ef455bb7445f67bb48cfe93512bfc0293551c0fad96bd4025e44a542db8f74874c12ffdb7416e1ab485470d70"}) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYRESOCT, @ANYRES32=0x0, @ANYRES32=0x0, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESDEC]], 0x4}}, 0x0) 08:33:10 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0xb, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:10 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x6, &(0x7f0000000000)={r3, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={r3, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2d7}, @in6={0xa, 0x4e23, 0x7f, @empty, 0x77ff}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e23, 0x4, @empty, 0x7fff}]}, &(0x7f00000000c0)=0x10) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000002d000102000009000000b2f71f836286a82bf19dd4fc2d840000000000008326037f7344e6e53a55ee86089ad87aaa9b3549236b949bba2325c9c3ff65f3f21b8327bec36eb3606b59358867d85292d0dd61f51bdd2d6f5ce42d793c9eeb8a7eccc3fd68ffd0840dbd00ab149b972a53de1e2c3fd6f3f15db3221dd79faba9a8cc1bde14fb600dce1fc65418fa6e5093d30a747d7468a65a9c1b76ad02dcbb41a1989645954ca20b892978014d42a0533321738f81178e94261e1a72c58393"], 0x14}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000200)=[@window={0x3, 0x3, 0x9}, @window={0x3, 0x1, 0x1}, @window={0x3, 0x1da, 0x1fe0}, @window={0x3, 0x2, 0x6}, @window={0x3, 0xff, 0x6}, @timestamp, @sack_perm, @mss={0x2, 0x680c}], 0x8) 08:33:10 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) utimensat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f00000002c0), 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) nanosleep(&(0x7f00000000c0)={0x77359400}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x1, [0x0]}) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000200)={0x52b51afa1526ba7, @bt={0xffffffff, 0xffff, 0x0, 0x6, 0x8, 0x9, 0x7, 0x8, 0x6, 0x80000000, 0x7fff, 0x5, 0x4, 0x7fff, 0x2, 0x33}}) gettid() 08:33:10 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000000)=""/80) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:10 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400000, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000200)={0x0, @reserved}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:10 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r1, 0x0, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xfffffffe, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20}, 0x800) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000280)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$SIOCX25GCALLUSERDATA(r3, 0x89e4, &(0x7f00000001c0)={0x7e, "4ab663d0bc5bc9af24315d125ce0c7f2e70b8d015be5dd1fb2efef91608787d575d8dd1bc9e782fabf622d823a3a2dde25d9b5009d191a2f81f7cad3dd5e3a58a8114a8fba49bc7570b400ceddc673d140811670f110cf06ae5fcbb4852c6da026cfc604e53714d6e561bd18ac4314751ec705817f8eb3f886f1050f7e0a16a3"}) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:10 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000280)='\x00', &(0x7f00000002c0)='security.SMACK64IPOUT\x00', &(0x7f0000000300)=')@{\x00', 0x4, 0x6d7058a122bb2fdb) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x201002, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000659abe2fc0a7d0fbf61f517efb040000000100000000000000000000000000415ebb79dc2238486e4b080db10e3fcdc85c3fec4a64617da4e00db256f39e6e3c22dad3fc50ff066519759fea3926758d03f8e18dd439e656a99b74067ab8abb8c6e899b1bf1786061db9e2ae218a6054c0caa1dc071551c8d7e5c52ed656d001e3766ddc638bfe8223154314878dc3fe96d15d4b3ac7ba1df7cfc77cc902c42961f8359a8b118f2028ade204d28ff3378f163fdefb55b82a0db2d4552724cdafcad09b1048fa3be26d00000000000054787b"], 0x14}}, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) renameat2(r3, &(0x7f0000000380)='./file0\x00', r0, &(0x7f00000003c0)='./file0\x00', 0x4) getpeername$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000400)=0x1c) gettid() [ 432.761876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=22204 comm=syz-executor.1 08:33:10 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="1400b01014bf01004000000000800000000000006a71f9b416c88d7657ae29184c6371d8f6e7da86a5659e6afd1d5809000000ec777306709e0a0e20a788de766019f8f89d385a452c39b569faa95524b5ca409e29f6bd12b5"], 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r2, 0x200, 0x70bd2a, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004080}, 0x1) fstatfs(r1, &(0x7f0000000200)=""/248) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$alg(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="0e01d47504015bb2faae536624db68986add2421fe26d964988cf278e1cebb4f010eb5306d6c8766fd8782192a39d1f711d1e97f1a103d4de021050abe64f5691056e1a11cb393cd162d023f13eef9cca48ff7b81139dd833a6584deff9aa887f5ec9091046184d3d940836fde0518362968d409a0c9e412c12ecf11475f", 0x7e}], 0x1, &(0x7f0000000380)=[@assoc={0x18, 0x117, 0x4, 0x800}, @op={0x18, 0x117, 0x3, 0x3}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x60, 0x20008000}, 0x10000000) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000400)=0x1) gettid() r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$TIOCGISO7816(r4, 0x80285442, &(0x7f0000000640)) 08:33:10 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000200)={0x0, @bt={0x0, 0x8000, 0x0, 0x0, 0x2, 0x9, 0x20, 0x100, 0x7fff, 0x10001, 0x2, 0x3ff, 0x3ef, 0x2, 0x0, 0x1}}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 432.885663] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=22210 comm=syz-executor.1 [ 432.998880] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48794 sclass=netlink_route_socket pig=22213 comm=syz-executor.4 08:33:11 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000000)=""/80) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() [ 433.189683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48794 sclass=netlink_route_socket pig=22220 comm=syz-executor.4 08:33:11 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='qnx4\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f00000000c0)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:11 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket$isdn_base(0x22, 0x3, 0x0) sendmmsg$sock(r1, &(0x7f0000000bc0)=[{{&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x1, 0x1, 0x4, 0x69, "9a83f000d3fc118dfddda7406508c18a219c5464a1cd8d08d096abd393023e07fea3300ec96b42a90c2f4550d2e1a16bf56e61910e4a1a8f0dc95962895e0a", 0x26}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000040)="08917182ea7d001a71f507cdc8a5afcc1953d149205cb9f6c203236e1f65855e8fe8", 0x22}], 0x1, &(0x7f0000000200)=[@mark={{0x14, 0x1, 0x24, 0x5e}}, @txtime={{0x18, 0x1, 0x3d, 0x40}}], 0x30}}, {{&(0x7f0000000240)=@isdn={0x22, 0xfd, 0x86, 0x5, 0xc0}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="09920ced706a16b968c13a54f5bcf148b87335bde36702aab73dee5249a12f2e9cc6557224ec0bc878ce269d74a7aa020f9d9cbf11dd01930e1ffb690578fa266f483dec712c31104b7816885812ca0296d7ceb1a9d0f22249820aa617d9a798568bc8c3f1e76c98c7ba741c858e7c490df918834b453eada41331fa345bccd86683", 0x82}], 0x1, &(0x7f00000003c0)=[@timestamping={{0x14, 0x1, 0x25, 0x7f}}], 0x18}}, {{&(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @empty, 'bridge_slave_0\x00'}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)="11702e8d384e96cadb", 0x9}, {&(0x7f00000004c0)="e4d1f55f37854bb7e6d57f21409a8cbb410ffb2156b37c94842a4195e568fc47bf16ecfe43966b3cdff854acd7b29a160c06124ba7ff2edafa4461f9820245b9a6df31526aa6583ce2d63ac3859b151db74c67", 0x53}, {&(0x7f0000000540)="6768bcb29a7560d12c457dbdf5852dda5a527398c477decf5820e0f08c99ac1880a255f61a", 0x25}], 0x3, &(0x7f00000005c0)=[@timestamping={{0x14, 0x1, 0x25, 0x3ff}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14}}], 0x78}}, {{&(0x7f0000000640)=@ipx={0x4, 0x400, 0x3f, "03f55fa2a04c", 0x2e}, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000006c0)="bf46d50e3d2f3160d3ac3f62824a995396e43155fa3caf41a3bb", 0x1a}, {&(0x7f0000000700)="10e5df35460313725ce959bb", 0xc}, {&(0x7f0000000740)="133b16109caa57180f3b4dfc3e54bad5bc286cb1537d77acc3a257dc8bf04122e97c2e29bb7fe4bdbb7d4d5e97d86c5169c67ff53cab1ab81eb73c875f7407b6207ea536b2f6041756c1c09145d4733a8229627643f443223b4b621e89a09ad069a6f208cd1cd5c6703993dcc9b055c41c2841e4d37ad65ad955f9a3d10fe468d623907c2e9ad1f44ad6485776fbb70b6a5bc79a4cefbea53e8075d73732fabe25057506e1ca6ca90f84e2d7c9032c25706f42c9130ce90cf36836a144c338385125233bf3da072d3a5c4da3f1c6fa3347207419afc764dba00d571b0bd4157d27ed", 0xe2}, {&(0x7f0000000840)="7683c36086d1608e707294d4a637a51c0eb357f36fe45944b25955601deee7734365ff7c77d4e37f2a7707cf85674720e7236ea0684d17fed52b898666f85ed39d008253da7cff75e27c0ae5db639ac2833958da400bcaa8a5d285d4b50bbda2e0be4cb35213085fc6f8555840f62509ba77751bed26475d6fbcc5f9a8ba777e22360a39455dd34d16d9e867348109552001a6bcd070182880972b433e68db708ebce555fbacad2065930fa96b09f8787559e7e14819dec3b2dab0601632793463fbc4b88a", 0xc5}, {&(0x7f0000000940)="112d3e1f1f", 0x5}, {&(0x7f0000000980)="9b714cdb62ef892f05e5035f33f5ddde30c3357425b65b08ac80ebd3c685f4673858c522c08927fe433a93f7bffe4372d0a8556739ba6f9bae2a0c978528c824c5a53efca96c909ea7aee1", 0x4b}, {&(0x7f0000000a00)="fb5c9f0aeefdaf473505680bdba1696490d306f87ec04ee6914ca6852710d27bc7eac0343b08ca2b69b8463f351e2481b7a4a8ab3db2843b50abb444ff557f2efa7ef3d934958982ae866246de96ba944004a5f331a89dacce3729a80c906e5092d061d286b169e9659c174479ed655a0ef5f6cffaad9121e8c38e39c364955e3d", 0x81}], 0x7, &(0x7f0000000b40)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14}}], 0x78}}], 0x4, 0x800) gettid() 08:33:11 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) mkdir(&(0x7f0000000040)='./file0\x00', 0x104) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:11 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x1a, 0x801, 0x0, 0x0, {{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0xc0}, {@in6=@rand_addr="2c194b3ac87dcd181aa4e5374569dbcc"}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:11 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) io_setup(0x401, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x5, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:11 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x127) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:11 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000200)=""/81) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) fcntl$notify(r1, 0x402, 0x24) gettid() 08:33:11 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x2) 08:33:11 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) tkill(0xffffffffffffffff, 0x35) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:11 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:11 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x1000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}}, 0xa) munmap(&(0x7f00007fa000/0x2000)=nil, 0x2000) r4 = syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) io_getevents(r0, 0x2, 0x5, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:11 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x800) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:11 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='\x81\vm\xef\x0f\xc9\xaa\x88\x11E\xc9\xdd%\xbd\x13\xd6\x17\xf9\xf4\xe6(2\x9f\x9c\x97\x10\x02PF(\xceJ&G\x03\xa1\xb6^2\x99\x01\x94\x00\x00\x00', 0x2a00, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:12 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) sendto(r0, &(0x7f0000000200)="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", 0xfc, 0x8, &(0x7f0000000000)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @default]}, 0x80) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:12 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:12 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) getresgid(&(0x7f0000000700), 0x0, &(0x7f0000001d40)=0x0) setregid(r1, 0xee00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r1, r2, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0xfc56, 0x2d, 0x201}, 0x14}}, 0x4000000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f00000000c0)=0xd75f, 0x8) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:12 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) io_setup(0x401, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x5, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:12 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x0, r4, 0x30, 0x0, @in6={0xa, 0x4e20, 0xca3, @dev={0xfe, 0x80, [], 0xe}, 0x1e2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:12 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0xfffffffffffffed9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:12 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) perf_event_open(&(0x7f000001d000)={0x6f2a85755b8fac62, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x308, 0x0, @perf_config_ext={0x7fffffff, 0x90bd}, 0x42032, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{0x304}, "2d935f60ae2b0855", "94fa963b5a309cbd75a6530a6286832a", "19b89da4", "16a5f089ceff8756"}, 0x28) gettid() 08:33:12 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x9, 0xea}, 'port0\x00', 0x74c34db8469fec90, 0x20000, 0x9, 0x8, 0x1, 0x10000, 0x9, 0x0, 0x2, 0x1000}) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x180, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x58, r3, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, '\nip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x58}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20004}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r3, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000850) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000000440)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000480)={'team0\x00', r4}) 08:33:12 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000040)=0x2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/y+\x95\x85\x1c\xf8\x95Xmu\x80\x00', 0x0, 0x0) gettid() 08:33:12 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NBD_CLEAR_QUE(r3, 0xab05) io_setup(0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$FICLONE(r1, 0x40049409, r4) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:12 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000040)) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:13 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x1000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}}, 0xa) munmap(&(0x7f00007fa000/0x2000)=nil, 0x2000) r4 = syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {r3, 0xb7, "3796e2", "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"}}, 0x110) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r4, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r4, &(0x7f00000000c0)={0xa, 0x2, 0x7, 0x40}, 0xa) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x10800, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1c, 0x2, 0x7, 0x2b, 0x0, 0x1, 0x12cb212768979b42, 0x7, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x1, 0xc00000000000}, 0x1000, 0x7, 0x6, 0x5, 0x81, 0x3, 0xffff}, r5, 0x5, 0xffffffffffffffff, 0x2) gettid() 08:33:14 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000180)) rename(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:14 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f0000000100)='./file0\x00') getsockopt$inet6_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000040)=""/7, &(0x7f00000000c0)=0x7) r2 = pkey_alloc(0x0, 0x3) pkey_free(r2) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, r2) 08:33:14 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x5960d53ba23c2bce) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x8, 0x0, 0x7f, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) fcntl$setpipe(r1, 0x407, 0x4c96a478) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) prctl$PR_GET_TIMERSLACK(0x1e) io_setup(0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000280)=0x1) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4200, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000200)={0x20, @time={0x0, 0x1c9c380}, 0x4, {0x2}, 0x5, 0x0, 0x3}) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:14 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000200)=""/81) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) fcntl$notify(r1, 0x402, 0x24) gettid() [ 436.278877] nla_parse: 6 callbacks suppressed [ 436.278887] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:14 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000180)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="000000000000000000fff2000000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x9004}, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x100010, r2, 0x0) gettid() [ 436.361483] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:14 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f00000000c0)=0x1ff, 0x4) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r3, 0xc0305710, &(0x7f0000000040)={0x1, 0x0, 0x2, 0x10001}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:14 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$cont(0x9, r1, 0x3, 0x1) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x80) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 08:33:14 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff01ffff0000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={@mcast1, @remote, @dev={0xfe, 0x80, [], 0x14}, 0x1f, 0x101, 0x4, 0x600, 0x12, 0x5040080, r3}) 08:33:14 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newsa={0xf0, 0x1a, 0x801, 0x0, 0x0, {{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0xc0}, {@in6=@rand_addr="2c194b3ac87dcd181aa4e5374569dbcc"}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() [ 436.581756] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22471 comm=syz-executor.3 [ 436.653278] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22479 comm=syz-executor.3 [ 436.682011] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:14 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x100000001, 0x200000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x400}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4}, 0x0, 0xfffffffeffffffff, r1, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) statx(r0, &(0x7f0000000040)='./file0\x00', 0x4a00, 0x102, &(0x7f0000000200)) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 436.725162] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:14 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x0) write$P9_RCLUNK(r1, &(0x7f00000000c0)={0x7, 0x79, 0x2}, 0x7) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x10) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:14 executing program 1: ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000100)=ANY=[@ANYRES16=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r0], 0x4}}, 0x1) 08:33:14 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() sendto$inet6(r1, &(0x7f0000000200)="a9f5c9c62d2bbb7ca020a36cd48407233d614c401bc08708d08ea7aa313f39539c705835df39bde119bfc97122c43439e9c44da147d0c23e9ccfce94bd082e9a0c9f3e5b2436cbd652a37894baa41e69fc254355cd1955a3e42c23d0049daaa05aba1b8ec109865703927737291019d6213856bdc9d993663590bc978fdbdca7035902d7ab1ef70a6c25ee9450ae9ae95bc98fd244b657a832c356ea797b37032bf8c0a4c7d9b26f3973c3d8033de8b72c67f7df1d39d59d90039b7f4e3329a5aba6257ae106a8b3ef0b61473aad7185f5c6121b95dda7a8b610feaabad751589261dd2e827d28", 0xe7, 0x20, &(0x7f0000000040)={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xe17}, 0x1c) 08:33:14 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfffffffffffffff7, 0x80000) getsockname(r0, &(0x7f00000000c0)=@hci={0x1f, 0x0}, &(0x7f0000000040)=0x80) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@dev={0xfe, 0x80, [], 0x16}, r2}, 0x14) 08:33:14 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000180)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="000000000000000000fff2000000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x9004}, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x100010, r2, 0x0) gettid() 08:33:15 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000140)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) [ 437.153172] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 437.174219] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000e0e7f8343cc3e77fe770d44a3da7abdc9ff335139d4e92bf0b0fea985e3f85d17e756dd67e52cd", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:15 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x2, &(0x7f0000000140)=0x2) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 437.245017] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22517 comm=syz-executor.0 08:33:15 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = geteuid() getresgid(&(0x7f0000000700), 0x0, &(0x7f0000001d40)=0x0) setregid(r5, 0xee00) fchown(r3, r4, r5) gettid() [ 437.331417] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:15 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='/selinux/mls\x00', 0xfffffffffffffff9) keyctl$assume_authority(0x10, r1) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setns(r2, 0x4000000) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32, @ANYRESOCT=0x0, @ANYBLOB="000021000000000000000000000000f1ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000ff210000000000000000000000c7cb1a9412550f123300"/121], 0x4}}, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000000)={0x74, 0x0, [0x6, 0xe219, 0x3, 0x87]}) 08:33:15 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x2, &(0x7f0000000140)=0x2) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:15 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) io_setup(0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000002d000102000000007428955dd4e451b2b300000a0000020000"], 0x14}}, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000040)=0x78) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x14001, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x6, &(0x7f0000000000)={r4, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000002c0)={r4, 0x3ff, 0x1, 0x9, 0x4, 0x9}, 0x14) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:15 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000200)=""/183) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r3 = creat(&(0x7f0000000580)='./bus\x00', 0x0) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) fcntl$setstatus(r3, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r4, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0xbc, r5, 0xe21, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20000000000008}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5c78350d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x75}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0xffffffffffffff7a, 0x1, 0x2ef7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x50b}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9412}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x4}]}, 0xbc}, 0x1, 0x0, 0x0, 0x8084000}, 0x1000) sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r5, 0x808, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x370a71d2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0xc004) 08:33:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000ff2100"/112], 0xb8}}, 0x0) 08:33:15 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)=0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700), 0x0, &(0x7f0000001d40)=0x0) setregid(r9, 0xee00) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="02000000010004000000000002000300", @ANYRES32=r2, @ANYBLOB="02000000", @ANYRES32=r4, @ANYBLOB="0207f80d08008d867c7b6a92678c24694286689eb3c9db910c0abbf70a046ddd648caeef458c2df8f50146e62b4be67a69e5799c5848035c2bc41452aa2c20631865169c2841f4b2a271103b82350e057f11179fd496fe17703eae0d6c830ef0bf7ff2c74bbb1369ed5bf9ee0b634cc07cd95d00de1ee391bd5e8e59bc530935c7c0cea399247b236b64d3424dae14ba6387e39c4703819f2612783833572a8eecf6112810dcee32ecf866b19ce57811e30c0a6c5f821b8a4b22cd0215f2e5570444bca24b9b68e8d609343abe252a10edc91ec97c651ce8c39c24df770b8af6a40000", @ANYRES32=r5, @ANYBLOB="02000400ccf8a3315983d2853d8374938db51da18803d76649bcc4ce7de020734e8b692d940c33177fedc1bc434d6cb15388a0ca65a6ed9f7da95dd02b646cf3bd877855a741db41a26d96347a440e7706a2cd9997673e86635cd1159c7d1c72a91f281c3ba8978bd8f274c21d87d4ac808a7d689615f0d859b59499a36aa83bc4a4e5fb7adc03797d6e24a0eb10742cfba658", @ANYRES32=r7, @ANYBLOB="04000e000000000008000100", @ANYRES32=r8, @ANYBLOB="08000400", @ANYRES32=r9, @ANYBLOB="100006b7000000002000000000000000"], 0x54, 0x3) r10 = socket$unix(0x1, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0xc9, 0x9, 0x8, 0x2, 0xffffffffffffffff, 0xfff, [], 0x0, r11, 0x2}, 0x3c) 08:33:15 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x2, &(0x7f0000000140)=0x2) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:15 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x1, 0x3}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x2060, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 437.886682] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:15 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000040)=0x1, 0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f00000000c0)={'lapb0\x00', 0x3f}) gettid() 08:33:15 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001140)={r0, 0x0, 0x74, 0x0, &(0x7f0000000040)="abae53f11133a3f1c5556ee4ddc810839f89a74c2663e28a8fd585821290e45f856626dd846d8cc2e96cc734da8203ef99b14c8b6fde0947844e17b0614e7663a1906ac3e4dba77a6e160cf9468adb1b19829b3f17c1e81649ebc85aeba1ec98909d6805bf7aef91543bba566b34151c2eb8f6bf", 0xffffffffffffffff, 0x2, 0x0, 0x1000, 0x64, &(0x7f00000000c0)="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", &(0x7f00000010c0)="d970204c0c0c271c01a15d44c6ea0044672e5b863f283b880c4f6fee17882ad272b84b9224314297503951a0d5e13c67af6c61c3393f9c7cdc2f053ed4dc7a250f8f4555088e477fca9ff9fea26bf875c25af9c29b194dccfe057fcf28ecb8a2ac4a4c55"}, 0x40) 08:33:15 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = geteuid() getresgid(&(0x7f0000000700), 0x0, &(0x7f0000001d40)=0x0) setregid(r5, 0xee00) fchown(r3, r4, r5) gettid() 08:33:16 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000200)=ANY=[]}, 0x1, 0x0, 0x0, 0x50047}, 0x0) 08:33:16 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sendmmsg(r0, &(0x7f00000015c0)=[{{&(0x7f0000000140)=@sco={0x1f, {0x0, 0xfb, 0x3f, 0x8a, 0x8}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="39bd3674a9290719c03414025c1e713363e2f8a01506caeb15c83a8c7bc3025e6743d34d0944dd0453fc44bbfcb8ff95107c07073c7140e9972a9ea2e999e329a0d2b76b2b839608bd26223a932c0a310f0bc786ea271d1657ba50c9be77f97c6278415ed57db6a1d55c5a01c43f0cf58795e73deb295cc0a0ef073475269878e5cef1721ac6e2b4d27b8e345cd57af55c47379a994928d19b87ee5fcf3dae49f4c3e22bedd51713cc350a4732a38506260b9da88f20efc0b84edcadbc6ee1538df2cc49c26888913eae37e51757237074", 0xd1}], 0x2, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0x2b8}}], 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000001780)={'ah\x00'}, &(0x7f00000017c0)=0x1e) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r4, 0x12d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @media='udp\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0xc80}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)={0x30, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x20004040) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001600)='/dev/ptmx\x00', 0x80c4e1, 0x0) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000001640)=""/55) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCEXCL(r6, 0x540c) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TIOCGLCKTRMIOS(r8, 0x5456, &(0x7f0000000040)={0x2, 0x8, 0x7f, 0x2, 0x17, 0x7f, 0x8, 0x2, 0x3e, 0x8, 0x1, 0x81}) gettid() 08:33:16 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) accept4$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14, 0x80800) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QUERYSTD(r4, 0x8008563f, &(0x7f0000001f00)) getpeername$packet(r2, &(0x7f0000003080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000030c0)=0x14) sendmmsg$inet(r0, &(0x7f00000031c0)=[{{&(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000200)="b082cc4a6a138bc1e8a7d0ffcec32b99f233904a1f01678b42d6cf925ee7b8062f966c50d2b3352a35887dbab74d00ce29ea119e0dab9a9c6fe45301351b0861f469dbd0938820df8784b5ca2aee22b9d0e7750904b31f93fbf463e1326e39e13d3a98f6ce2fbc8e6fd1055f93411916a5af18528d8184687ddb67cc4a6b271594724ef4bceb414a182c152f88c797f487daa170c3b24ec8ebcbe60b4022c24fdd2f23a431978281ff816ffa8301c8ab3f8cb6184816dec72f342f3952c684c73e74", 0xc2}, {&(0x7f0000000300)="a46371c84fb76f4a69a1ec3cd12993f72602df71e83b32803ccef10d65bc69000978bfddc7534d48f364726711475681cd111259c4af8de5f1b2c67ff7a2825a454e346924f57555b9e9de30d73477766766c6c8e1b5d825e7981c837f2aa5a9e517e73662fc18be784db6a5451c96e9e7905d0cac54765ee8a684a1ae279413a13950b9106d57d99c64c526c3e7bcf107", 0x91}, {&(0x7f00000003c0)="b418c1fd426e107a8d2ac375b506a834c55909ced1ebe33f0e66fd62c1ec4306c578473ad5e487adda2a5c61058827351773ce0ad0cf84e7a90fcc112e9561723467bec6139f89684a", 0x49}, {&(0x7f0000000440)="7032d9455462fbfc197c78e377d28e4d6c5c2666fbfc4bfdfd7f36d0df78c68c74128420f7ff8949c98761171cc056b8ce500b780718ff1477a6bf7a44a780e8d1066a79bc", 0x45}], 0x4, &(0x7f0000000540)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @loopback, @broadcast}}}, @ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x90e}}], 0x80}}, {{&(0x7f00000005c0)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000001840)=[{&(0x7f0000000600)="931da011386fb80a262d9ba25bb02b81bf253720d2da6c1b", 0x18}, {&(0x7f0000000640)="7e5ca7a451fb846d3866b75b9c4a145f1547f20d51cf7dc8c05419b3e78429dc60440bd74ac4dc41497f0358b7f087d81a79ab5f38b097ec21cb847f2f943aa40d71be793708fba1f70b8918a9ea1332c4eec27aa354310e1ce528fe92ace9cc7070de53fcdc64032ecda836956a36fbb9b37c6da0bd09fbcbf76c5a908d171424e5e832064711dc906087c349f571df1bd365117c42fa1868378d36a0c7ac6b2d9a1bb46b323799f23660c8eda6591d1a0e55c50a8ddfaa4d27959d07d60ffcd8596374371040cedfcc5c1206b5b2d72798982bf4d8d0955deb6b15629f2a433b7a0a48ea934a4852d08b90fcb66525f55828f7fd210cdd7ed88bbc00fd8a9f02b4a206ac4fd13890e58268510dcbfd1e75ff2afe9749b9d75c5c2db05634f390ec7c6a84b9354491a109f2d9ce1d465fe06eb0802fdcc477ab7b1c17303e3d7d609641492040f5f8ce20fade183bbf45bb99538cd8424c5a0879e0f1454fd85887d57e6caa2cde58d1feeafcd51bfa47fd9ba2c8b1e20d37f427b10567551a3ac81979d062aa4d019070b39465719ec1ff0f45930bcf3812a7d356ce1ac4f5c7c5e33122abd85c8b9c9f4bfdb46635d4789145fadb6410de46985cc50722d10191e1e41277e906104823e19a045546cdb8d22901ab22c4eed6cce55cd03c13ee4458eee4c228dc0d65046a2ad945eabd7f228b31bb9ab4c10e7d0f27caf2455616311d54266fb102215c60045196574c5ea39c68b2ff6a666999719661f6eeeb24d83397232de56d7d7391b60755ddd444dee9b2ed991e94f01d82890db710b2eddc86449ed0eefde664854244cce1982d8b17016f5860c8d33a3c1215b7b91ced5fea4e11467ab31263152b06a564204b94274eea73ec327184e56e26b17c3e52d5e667a5f32c8c3a4cdea28c3f7093e5275229684fcc1985109f48cf097e0f7f78474d8facc7449bbf7c40e14c89e48940868654b9f441b39b31f8e680d7a6b3cb8e215fdf93de867d2ec6fb02dc847dff81a21c72b4fe7ca3b36eb1187a2bb5ead8711288b225759a15dbcdb058e75455d531dfda90149b9ca531d6457284d9348dbd68548ceb21d76bb681e80c53acdb3bab34d0bcd998be6337144e6fb1afd3dbaca881df36c27c9f2748381d87834fcc0c68b88ad1d892d530e14a9158df8cc87cfc35ebee20811939ee32ac68dae4daa8507b4ec789a36482cce4ce963b343767d3a8e9454a3b8b49dd12d62f1b175e8298ca1dd70f40146c5ff935509cb518e0832e048e3b645eb48c6c115cac035615446a6ad70756640fe0cabdd02a2771726a5d489a3980eeb8838e4f3aa8d2042090db06d0bd7cb1c290b9a510b908ad30b23211c63f9d970614e1c7d542559440046c1687053882951b153da59ef6cfe44c6974456e303818e04fd9793bfb7de4414b9a59f8cb6830a0c3771ecb857880093b652cb3e79959980c19ea161e2f69227932d3847d9c72d852ea9e3590eeb3943be105fc7a59688d5a1b2783d9d487cf6d6fb602a8d870635c2661df72348e3444c6f0d543bdaf75cb08117a6abe8317b1f7fa6c2fa9e42b3389c29af8390017027e6f23e9a8b61924302d39d79dea663d0e52dfbcd2ec3fccfefa084faf81af7d389a4ba1f71bc23dcd7a2e85680579a2c3f5acbeee6c6b9c1efe393247f5e53267513b8d98a8dbc262eb5b4128e0cbca261bd47592036f3dab3c99932115660a8e1933d3a7b868f4daf1a5e05697a39f64834b250cbdb8901f1aab28bc3a3330f951d4e3da0fd58ca922cdf02037331982fa550e7807225f5f59f282490d9009903619750c4a7d29a7015e510ccc39fe7c19c7e5e080da70b3ccb6a4408e48b557b951b2449875b5d7679eb6320a2549395ea9afe90b800786d1115c4ae70f8192e4501883a521bc447ab7b4a31369c558618d7a7594f4e850e246082726d8a39c19d1d7e52acd3887359ed6a36ed1d3db172e8721bc0588d5e0001583466b4574d0cf7ee31a245d53824ad45b173a3a4f102d21d2d8665396ac07f702643b6590e376c5f7dc9e1805f8e313da987134f9f0f4a00f658da9589d1f93a9fc88b410715760bf7015456dc654f715b9e084e29e59483f07b19d4476a7bdc0dac6a82ea0e8a9d99829c9edcb1d013e01a49d0801a738f3bbd9925cd34a3e628a957cb3bc7a43c7fc967199072cf6a3d9e897d94db2cb389c03223a60090b82bfff4bc4bcb65fecf461a245f5224ae445fa5f3d5cf2d3475faeb25a755e6d9b7e739a8ea88ee1c8c95a5a81c2cd8f408b33aadb8bb0b948246898da0f002f35ad4ecff20b4927d30da00ed3670075724aa00b7720976e4abe7db7d7bcc58c8938aab2d9d89188efae1721af59b9d59c53b3dbfb7779a7ef47774bbe33f47e63905b002b2454ead048a46e651117c57b19153360fc131faa231027da9ff11d14f29befa41dda9d57298abdd79275bd7e0f399607ef2d294cfe3d144075160379c537181f2d3f506401457f1873fc0fc33a7c899dda5ed615453547c826fe65f723330bef448e40e1ce7d3b7db815731f2e55bb9788310d46373941ae329a4d0c09e477b00c205983a090dd13df405fa2265f64cf0fe2c21da48581bcf01ddf841875f4b01140cce21ceb58d527657ea5cf98f694e3b707e8eb28bab37344169cd194c3e0f501bc03c64d0f9a38610dfc6eabcbe8baf129a7ad7e53db890b4104bafff7c4c8d2db07bf74541e7573f797af82e41082887a936fb69ef3c1b603bdacd446bf4c8ffd4c1003bcc676e89891cc55b462b89fc97fc530f550ab1a3eeb53bdb24d32d4f94a775c985c7976958ce5c57707d2a4fc595db1609ed7a7f903ea55ae67d66e1044715c91968a49711bb3ff86294c4e1228ca55db2b1f6bfe73ffa00d6d149f56b3b45d3a40ac3ad9fd68582dfce4e59ea66e78d6d99d4cbe6fa8e2662cefe8f17e5c7ca608022ab007ec8ec6150a556061353ed554ba9d013a68ce8d04b7b9bc5b476e724dd9f25be029b67ef558493488bcaf482c1f66c8093b4b4bb20e267e037f5dc1c1df6ae7f085686d1092c0395906e88770a344e3ccfbba70889f19dd1d0950c349fdd4f086fe1a3c54b69c1a3bb572ceca7de30e760b49108d9f635044eeca3860c050f78ff056b0d17005d821b5a9deccc7a51d45df9b47bfabdf73d71fd4035c51218c888b5e35d2e4a01eb8c72f33552206ffcd36989f4f985b93aa717e61ba57ad434cb7c55125e17e5e57bcbd1bc48b08ac0277b42bab7d371f5acd39baed42e4e6188933000981344a79c4db38da32c94ecb9958fc4ad7813dc7312c4f684e5bcacea93fea56591935f0bb70bd1c1e06a4753e04adf4555ab961a6b4564950c9613cb6f26c67638ecf01908f36984b3ee97f1335a5c283992b0206f82d01419285f65ef6e3d4e41b6db53dc10bf45c2d76f1d4fd197a31ec44dae9e4fc67b103e7092b608a806a613782a38b0cb467dc5908fcf3ca4e95837f37270d48f62ffc89dd0e01ddf444a64c3b6da87daca5d7edc824b336a5d22c089e6ec543172dd4a28cf1ab8402b1d487215573af8d67932547888323fea5c0a8de2c1b4da9c9199daf4f1aa822d713ee03600f7222705b6aef20fd859db5decb6f5b798491ad239979572b16e34b47b6e58ac28a660781d03ad63b8032de7b7ec2d55c38b150c7553491105fcfeed3db9a7891ca270f485eb42357a6c0c56a5da74c4c07476590225775c52efa43678384b782e076b44f3d61dcc3608107b942845fcacfe3d3253c52d8403189a7223f997bdcd2ca4d00022ed9c523d2bdd599ca32e4c90e1f0c3463809b1323cf924d7919bf39b605b23d50d8b865423927bc7ef015d8e6a6c3bc82be7ae82298c90c3be66f39675df805c4295ab4ec1ac3aacb992f695d168cc7733192c4c9650c850f87f635e75b11a09d476133231b8ef2917119bcac6258192461c5d7da9abffb5d51fbe6cb8dd890a8f860a748852858dccd996f327367eb5a46d0cff5a28eff80183a454b37ca6979149febc2c2be1fd6b98e1edc87940a5b990c0e64d3fc3345f109b25ab750958bcc305ff72a827e4c19da4b21d453941679747d873e23c21a656711924f1292990ca070ac3263c150bd716f225a9b68c794ddcde2b55133065f97a402ac22f0d5aad48b090ae4e971c5cb45212617ceac6dc31b7debf3c5553bef00e815c38272682d8f697e89f4f32d7009898066eef442441fc8d009294d0d27ae24259043cfb7643c6cbcc3cb133314717bfae3ef64bb0c2f99088878e88ca424c68a8d7e9b704a0df6b5a9e76ff4835ee6eb421bccfed1e19e855310951c7ecd2488bb6115172c136c5e1af7226b99f216c717b69fa9d654ecefd264c5844b4514096030100e7d75a222ab2c6d455c51731fd9565a2599a29c974ae0744a681c866faddb92dfbd0ab3247bdb5f613fb37b7455ffe4a67552370b1886df5c8bfcbc7d3f43b514ff12326509921e93e9f8beb6e98beac42384bcf3e9484c1348d777a42ad63f02140fab5d331409639849f5c9015682e609a479dce67f62028ff2556984ccf2031484e0e7499a12a242376678371bf8379628d2d0010dab760de6bed9bec7cbb8a3c52682138d8817dd0a814962e21b10e9ede48efc5d47f006dfbe7cfd11c829dedeec6ea152abcd56b243d3bef1fe36846edd880223002f2d3a63992993f38563131bc541d101abf46474e7443d2090004fac356b55de92a5014f0ecddbdffa5ec26faf999dfdf5eea85ca1d1d461a2d246dbaea8bab4647b43ad85c0779dbc58bcbe2a89db518d07157ede89d23d58b798a57320d92c5a470a415305fdf8454dbdd85f63f55478ccbe6f2468998986e3f4b5c0658aaa58d8342f892063a08aafe5477a12bf02db31255f0bae866f4b1179e3a89079051216f301455e8d23b34601cefc5a32983c4eb1c7a8fd9b4667819bc303a963ff79b3d587790ad02899a8425a369252cb1ce630415941855ba886857b78b619ed20bcdfb7a43a378df09bf2f8c9776d2312352705d64ba97e8c445bcadf34f78d9bcd3ec7075531592cc6eded667cf6507138b7bbc9871dd538a42be324ee8fde28591889042a14f584cd6c0b6f017e89f20321fc33fd3196eb29f7caf728822aa119b533e9206c45acb0c8fc859617ae38c2612ff0a08d756e9df741113b1ff7cf5b2b9d39409fe9696c24f7bf6a4244c54c5dd2580aa4a7cf9939acaac3297a9fbde0c8d05478a706fb851660edd2d007a94c5408df7a883a2c4b7c915b870a6bf7b8940de741662d56c49d5e83efda45c691675645433398067d0de783398f24380b2e06ecb2af4579b301cd96c8f6e971728b7105f5944b1d6436447edf6514f45dd46b30818870b831e2ae8cbf7d8569b2a8b8fabc1e969415cede48d970b3058b908aa23dad92112542137a4699cfd234b7fe234e69f05598beee74276c5d58f690799053d679fecbaef7b277a6bc33db62ebe74525de72b1fa07cd486f8fd1c29df944c65b75ca15666c49d34f81545d88f2db1fa3c91b8d50ffa89647dc7225fa58839312d882b9bd83e23ccbec34cf12e277602fe9b81859621549d5eac79c6c9f33e99f059108e84648c11f6948198299a4b51b7a4dd734be1aa2374b4b57d115807d37e1f6ea76066cad15118076961edf249a1dc5fb38bd37af4a225007e56d543d888156dedd70dcd7b25be2a82f97a0763892392e7466584020cf1da1fbabd4a67f433064df480481bb9739546983f29fcd99e99bda732892d293786af7", 0x1000}, {&(0x7f0000001640)="6f649863122911e115be64cc338d25e9a52e2ed428ec777ac04ca559aec1", 0x1e}, {&(0x7f0000001680)="1232b0cf51413f44538e9950d2ffecfc5cff794464109f97639bea7f9c237435c1d16a7b7174f05ba5b6d698e8a2c3539fd094f59a64d76f1dbf1c64de24344b69b708f4cdf5f90880932eef827558ccb70466deac12c1652405bdd33df76de5fc55c3885be19e3bd80cc3cf6ad1cad4c8fc5c0011c87363381e7b03a206e962cb43495dcad6c9daf9ad7a4771a2f5ecd5d937fbb125647c703d1dafd7bdc98d0641bcbba3007c759780225fef12fb0c22ba0289a19a57766f3baa78830f487c3418508e62392848ca1c72aadb265de0ab8facf53ad00eecb34fcd6251c558cd235d87fa5d6303", 0xe7}, {&(0x7f0000001780)="e0c13c4b7ab776e2a54a9563a0054ec993d32040d52e1ee230a2beb46e6332bf31cbb3b763", 0x25}, {&(0x7f00000017c0)="68f44d31a65339b163058053875cb48de228d1248e25001544a37a59410bcad79f49c44be4a3603047603b26505564c413a870e1fda74151761b872c8d24a10275f668f46256607623a880d64cd2ca83b35d9023b97d980067a8bb831c4b57ae50ca55a4502e0d9ba9bc14312c3f9fde63c949e418f4b7", 0x77}], 0x6}}, {{&(0x7f00000018c0)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000001900)="a7d2ca05b5cd6f8e96bbdeedf051b13f50002738ecb3451e9b1fd0ecd5673c", 0x1f}, {&(0x7f0000001940)="93d9b1019e2ba349d262b9c0bf89be441d392bc2ca0c4c0ea90471749321ed882a585e3fd69605b362e7e5206c29e6eb41755f75921f9645320dad2528a00b4d157ad3fb0d55bf16276c15fbe8f6f92a74967868684d5697faffd53e81d3badda05936a7c66957b1f8cfec3e8c8e1ae6f7202020465067555064f6219e6b0d4bea98c9a6a32de9c95aa661a3082d64d48624cb7e8438edff20eba24a4c9bff38ead214a05751d1c737a739b5e5f9c7f6a76cd2a8d144c7176d30ba1d19838004cc2f", 0xc2}, {&(0x7f0000001a40)="c22ac13f45fff6e5e433925fd784cb1034d4fe2d205335b4d4f98592", 0x1c}, {&(0x7f0000001a80)="6a854e613efe699d387b0e2a4823d26cd1d56c", 0x13}, {&(0x7f0000001ac0)="5215566e138df7941de90809a6f6006f28ae73000357935eae79fefb2bb41145c5f2de3b8c614a069bf706146917e573de6b210d685f2a1f4533180e91b6d9c764555d8ad9bda90a0366b64fda3945ae8245a64b00fb601086f6b510de60b07ee38537936f7c3abc13ad80b9dcb8d022489f5af47e9503fd39e236735f918106bb9f8d5af06cac4fed447dcd4ac5b8533c8e477f2c4996644f3f8848787f2d", 0x9f}], 0x5}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000001d40)=[{&(0x7f0000001c40)="097d66b3f04e681917c0451ff8defb726648fe47492ec98736b36c983bfc56ba325d26fa5e0e3a83b4bc0bef0d23e860262c446eb9af2de89023dc44df2ac795872bf081b22037af15e07cb655a155ca145c238e0094f59cef8532fd65871deb16be17ce1013e0759859d3fc9b519d35491dbd1888bf9e4d5761c47499293a7d8785a96b23f3ba18509a5d6f7803182c8ac9e03264e0edb4c2afca6fa4ca181694ad8a00f595be4985526eaa251b16bf79930e94d4111225215959b0c26a3fa30ef5d78cb6657fddb9cdc885bd4296dbc1487ca8", 0xd4}], 0x1}}, {{&(0x7f0000001d80)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000003000)=[{&(0x7f0000001dc0)="31e20cc5806313127cd26679652f53cd41c46a5f5d94475ea0eb42f694a666c5751a8ec3bc37b74bd5ac8acdd0a8c35a060c27f52f826e713deee51c8700812ff6686a4e0fd7", 0x46}, {&(0x7f0000001e40)="fc311ef4263fa9109327b4deb09e8665956ec6f08d8b01cb93852eb1217e23fd2f827514318764da53c6c08e00e7a8b35e8f573ac4db52cbfbd33cc7e1b79ca02d20a4366e96c3e3fec9f1fd37c31a12419a4783197daf1cef0d8bae812c5ff295ed5fef51810a3b7e3107259d9ffb9c6de2a151a799f32855364cbf892ef1980ff7e06f84a83a8195137fc7522c486f194eca89bf7deaa1f2838a10204c0e6af6885c1dde9b562193515c85f223e4adf89badb8e929a7a7c83495561f", 0xbd}, {&(0x7f0000001f00)}, {&(0x7f0000001f40)="84b2a231ef3ce5727cd03e4d582b55ab1fb12f4e2d524b61156d73a80f1ecfc82d2716e200312e3b437613701cf7f42928c426595e0446092ba2e100f344aa84aae2f0eedb4656afccdd2163c11139c0657453893f74e2673c26291db360411e338c8e0f1626e76f8e66fc2bd88c7e567f91973a5429bcdfd84f4606a0925901be83c3239cf9c55a727b4e4fd89c84dbd794959021f2394ca6ba42b227362afb6eb05eec69cc1df51cd25e703f1d5d82e61b4102bc5cb5e01c051955", 0xbc}, {&(0x7f0000002000)="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", 0x1000}], 0x5, &(0x7f0000003100)=[@ip_retopts={{0x28, 0x0, 0x7, {[@lsrr={0x83, 0x17, 0x1, [@rand_addr=0xcf82, @multicast1, @empty, @empty, @multicast1]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xc6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @multicast1}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}], 0x90}}], 0x5, 0x4) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20, 0x0, 0x81, 0x804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30408, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0, 0x6, r0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:16 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f00000000c0)={0x11, 0x1000, &(0x7f0000000200)="3f227a3765cba9f118256f24f252b18cf802b878b3a3f826a2a158f1c4e42fd92a56ac19416984deed6f556c6e9fd1e648745bc0ac5afdeade1c9fe344b193e79427641ae753f9b43d5b08933fa910da8d67a0d2bb4334b70f656bb4fa11f511587ef978bd996ee924653fd2bddbd2aa5653174a3ea450063f45828e8e94d504c4e391ce63a4c8f1aed86b52b8f5a22a4d44efb269b3367bc336f7e42d06cdba84f8766060819dcc7c78103a497d8713e927c9c7eed0c415f0d241ff6152fd405f9f1afa7b0997653f3314e552cd2f99de32d4239011bff1542d656e9308ff7e835d69fb38c80a61c4d9d33bdf76bab169db1aeefa34d06866a47ad98a29edb082ec5b455e69524ba4534171d6d8027b193f3ed118c8a80af3f3b2d906e363f3d5b1b934f0a8811984a229003f4bcae7e34042913591d5e63e7cd34c22bf88265cbf55a53087c84b9e9bef5b7a6d18d649dfb039ac6a33ea4932aa33c6eb9410533f57161da930fbc8ec4d6d5f2949d71e8a4a6d55eddbe4a9a861d08a112c456b27cf68d7d2d79adc69bd515ece94b65d5aee75403b95ef89d1a7ddde7f437ac0e5e99c42db6356323ed360cad1e3ebe61a73b1fa7584dcf56626e31d1deddb9b2ddbcf04cb8c4acd8803f9218b177694bcc51a19efd716b99e04039de6d0fe26ba65639b83eba1abd07957be1e6f355a01c95aaece8eb7aca07fc707ab08a745c778fcbfa8e6d5a605a934d51ccebfaaa091586bcb34dfd756e1ecfc87b871f026b7dce1bfa54b6ad13ac978bba70aae659ce014496c0945bb66a46ef59180c566d8d98d8bf8d65408f68e4d19a3fb59ec9c517c5d239b99e006391be98557f8c4171504555c4b10b9569c8577778d120cb80bb915cfd39c20dd11518e03742dcba48cd6daccc854ff14d0705cf774b9c6e77cc2d4bdb5b67c4d0203f2b529ddc174d5c839efd34a9165e787ee59d0e261b7a4df769373bc9ef2ce71c0e23c69e092304b685ea8413438e3bfefc8442fb2771a7454d1cb8f5017928df690db59258a28bfe2e085ef24f0bcf93f111d43156dce16d1feafd8a2b5a65e8bd9f42dd06129db4b9b0a2fbddbc8458ebff1ce0e8f66cc83bdd6a8e8050b87d25c2e5fc59b0c6202317312eb3b34ba2b2096a4c54948eea0b0f978d040cdd1773a2a671860d4a81eab31e319f6461b28a6fa5be054d30e5ef35f7acee181b73bc925e7b531fabbcfa9c7eedb51dc121e649e9737952fdead60503fc2925c7fe96a4d3ecc41a8b33b2f5375c6201d5c1b75e6b46f5cd91dacc00b45274b368ff88254340f6c18038b1f5b51a6d7c86f1bc8ff088dfb2140fb243905f4c52bd21bfead103a77d44d10715b5f090b52f8bb9700c7b34de81d264d0850a205c3f5eb35346bff1b4fed4beeae354ca2756122acee35479bca6355d16a569702ce3b3cbad1022cb1afa97a2831edac0380774276c00ea0825b9e5f27907155a0f8e6336a5a1eaade933158cd8b5face126969e49f1ea24e0b4fc3919eb1217efd91a8a2a47510928e5cbd9425bcaf227feec41ac952b30720ea337d557d162e1fef123cfecc2d4dc137bf5349a652403b79d86fa74c6780e9cc6efaf801dd0c84e64cb8f55c44f1477ef84f8cb22798b0a1827f319b2dbad55f11f45740edc6b8f12ed9b3a4c8c49e964158315133cb6985032f3dc40d060e8752726b93b57e0f3b1f472c1c320a3ff769d4734f25c914ba249a811bac84531ea1de40e7b3d1a5de0fc2fc4cb6b4024c2e9efa10765737520ed5feffb527bde23aa01a52b824fa568164b8ab0aa1d630453281cfbbc7e89bd950d9d33bad191263deee5d0e07a75405a7edfa0a1d1cdc4fd0868c5a9395fe8ae77990c96c452e803245ddb763f6e1d277aa216744c9f97dcbf090f02d3e9192ba86e5cbed83fb7ca891afe80988589c635da658d5a4d5a3f410414ac2a268db0159efa523aa89738ccdc826a2f8a89fab45a396185719ff863c16c590482798562341b0d9702189f7d709b62475c8252525b3113b055739c50288e052286b7b9e8f71ba15f57475875fee4f5bd6dd41a58da9272cb1cb81fee15948d34f211169309f8595081acd7ed86f684b811340d96e7ddfb71f86c197059d59c5b767856e2e43328455dd183f435c9539c026ea24193fe676b7e694306524b034abec131165417abcb5d5f288c2e10c1e750a4bc431dd7aa8f1fa298984deedb327330d85a4593ed89eef41105590bcb6d2e4a1de2e29827e5b19dd7b259aa7eeca091c915afeab13fb0f5684716a012d10f26d4fdaa9a0e6e82bae0fc76c6010010c70086447be8e9f8ad81cfb25ab4a51059f70a3448d8e56b0165c42b896491c629d2eb9e7e191682abb8e375d85c321f0da4ccb33d43f363dc5afb4863c361339e2fe77d8ca322538d48f4228a6f0314aa86a5abcbf7b5db4c7cf2da22e8ac5bf3ce8e1e53a10e920b679f0ce55ddb98bea16c57590cd13f05a4a31000818fd138282749c28b516218b28e7f36402b6d6414912f717c11aa73549908717febec35617f82645f50e0a68ffd41a92cf6fcb233f2da74baaa42faa75c7e8aa20c8a9a4dcdfee61ddb793c86a7138b0938136f5f9c26b1d3124cd8e4b30dbe7e418d1caa0cdd351406095c9e7cdddcf92355b7dc53c55a071543031d8443d21f9b8fa5337130656c9f94bfa8c5cc564176416a46e026e54cb6adf5b6ea955c94148dbfd19117ca0d2bcd6f26c29fa2c8d3aeeda3750213cbb9ad5e6ac2f378ac454b4bb51228721683aa2e6574f9c9fb49ebf9d4094d0be6f17c93ce4d08cfb59590c5bf25a0fd06a04c141858754552723656a828c87fd912ae8a6f290c65eadf551d20d58765f00fe9df83153e7348de11238a83585c72e1c4ff69da1c8559c6e2274d0cacd1d1d45902e8537dfe2fedc0068d3c11f42f7b080094a592cfdd1e0712463deb34c43c561ae82e530243b341983134abfa57164892ade07cafe680b1695144d04ef631e3d0cd197d605a81af305d3e0a45a0936f4d62f0c8e027b7e486cd306b702665756c8f4c9504ba70404be95149dbf48b412c57f6b3a789b4a719c58b74146e3aabbffb0ff660c9c35eaaa2b42a3fafbec8a5217f6d1e8f686478025360b3527bae15a68162054abc6b1f4860ad37e0983d8a2adb3bfbc90c11eb80188436f4de9ffe6281a8bd74c6ef88cff36d79e272a1b1d844e2dad7199c094147a7e1955bbe676ee402699809ecf9e9d413ca5854eb43dacc7802d47b7c400b080ffc7fc66e0df38b658b896d7069ccf8d7a386ac20d5f5c37565ab8ae18e94ac90b303c187709fa18aefab76dca87e9d97f7050442fbbdf82ed49214eb69bf7af7364bba2efa202d16bcda54e4c5fb81b54d60a1a53869d58bfd4c46b711afe0a26a958139ff4aa49af4d7236a1879a8a5261a695f1cc90dd63710450a8d18e83767b66dc7c8d36b81bde09c2307b6eb3c4826bb138f7309cd75a156df09b780e93e45b81b6721ff5c6641e41f41ccc8ad68c9967ecc9ae95382a0d9629f9179c519d67558e54ff6327c710b7657cca6fdd0eca1d455e9f8dd3cd10186c119e7bd7aa4b0e1c77478e7aaad85063f7f445a729b42ba2829615dafaee454a20c1246294e038350b8d495744bbf75504a5913f6edfc5a3c5bfc5a1a211a32308e6df5de44d2c0392e6b09c8d8e2e189b75c2c69c5b14cf699ac0774cf0093fd7d05038706eee3c511fc6b76b3a43876ed17d76a1710b998d53db26f82bd7b32d1a8528621b9a38e8be7d4bbeb0c4d454dc1d4d2e59e81cea4dc737813de35b05664dc6a637183484a1c1019ea51dd3cc2c4e28f7dff0075a8501a683d9206754b873a337a0a8be0a9f16928f750873d47c2c589d1b5057d57eae0831e266bed723838d4cd3e020e1830ed0ef3e1244bf0db54baa418a2afdb039ebb3019253be341ba6c0b9761d065e058a6ff30ac287544266d396d550347e196771312fe0992e0f8aced4a5860aa8c67a76b1a049d02b94927c28b8dad2cf3cf5f805cabf569cf8f08d58dfabcbd03b9cfe110a20224fce6d850e584987e1045e0e174eb23d05f3ec1c48319bada9c159f7ebbfa7dd190d05cdcf232be9189fe3ff230e5437efc145631851dad233ac83bddf326482aa94bd832428f9951014d8046cc9be2f1dd74d8946c0e216f2fcb1eeef087b34eed5be16ea56d414079f1a32dd6bb9cb6bafb2e49abfa21a2be0cf5bd225801f700d49ad41f42f4b635eeb66fae61371dea2c5a0b0ab55021f2dfb7a6893fe495175f533d2d5acb1cef67fe53fd6e3d3427420b276ce0761a5dc07f575420dc271f89e1271e27d4d93255fafddf3963a85e826c2654d47702a447d85c3353cbd14048c1426c17f249fe0e0880cdb99517c7d2209d1a70dca45e70416bf7b4779c669f7caaa9e2e4b59a3f8bd067d1bceae2768a8931adf81066bbf366e8b46b672ad1da047fac421c384bc484d35d068f18ba1e5f5f43eb9227fd4aff68802f9d92f301528bc278a97e54e9551024b5b520878fabf27cbe055bc926622755533f1d473a8ae062a8ce77a39a1f82ed05b9517562d0526b7e3dabf0a547664ca8b48d24123f0344cf5e542e8fb3385429a94986f65478adcedb8af0d9c3bcf4aff9f1bd12f98cd85a2c956af296db3996487181c2c5c175a5e82c095250313a310117b6bf0b28e189c635c5fd115dc96c63615303ecb2fed0c6435b4d4a851c81256ee854212bd22c62e22766fec720c5030a151600457a2f23370c01e9a519aa716c81773840c94ce0431aa05a903297b857d2ab130b7a48c40d413fbb7d8f4700104fb0f7df34f5daa7ddce0564f1464b5fd7bf255cdf56ce83dfb6df887160bfd93f7ca9ec0d6fde62867ea7aa5ee9fe2c9ac88f4d48807c634d36faf81348b19cf9d7752f8bfacf4b3bab9a4e4a25b27edf0cbea39a3d44e316225619ffbf9689ae52550211fd073cebe3d52ca9cba5c8e456985cb1670926900c83da817fd3f522b938e312ffcf290a36a65e9fe68d6eca517f07ad4889f8b458e31d8f8883a453f0673203b61edad037290bcdf0ebfd45006b05498447d32a8220695fc06c38fb28232fa7b405b4f9cafbacbc396c52c9f35ed77bf41e419acdef3dacb6dc625d52445a11961f8a3560ff57e24dd1b377a9e419b6e4a9a0c271f57b6c5ab74238faca3ae0547a19073f1ff5e038a5837d7504cc56379a227f39015830c38794211a2b3c4f2954dd8b6084991e882792f9dd961ac9b1ce4ea3f1755b22fa509ea844727231fd1abcee1e9dccb4fd2b2827820923289c608a3fa1934fb9b1508458e48b6ae5b77590a89bf5b41f8fd750a80db298eda3240587ea4b565c465d98ca37e25bd55ae65e10e61ca78f379f5b85cdacb4a2175a994f6c5dfbb2de04d5a85431e2b07bbf2d93d3dad12249daf9072342d2b040620f7f179d76b3827e10108403afd5a8d87662debb7493090af32e50a0d0fd833ff58ebc87f05cb52b2964c27f3731a889883430a929d4f4285e252314ba00f9c328dd85913988e464887382d2c6a27d196f9ed4cfbfe7d0bc0a4624acc90ba697d66652c43b7606a68dd79fa1d7f8b919c1887d01221e33cd9cab215fa66b726061de74059e438ff4a909321d6066a9f4e8effe82a8f3db51234abc50ecbaf50b5cfca99b2d13b50e7bd81f613e1903433e5844058496051027437d406bc1b43a554687236614de6817cd51f9bf08cc06ab832e95aa405b73f86059842adb52be34940bde2ff041d49833"}) r2 = gettid() tkill(r2, 0x3c) sched_getattr(r2, &(0x7f0000000040)={0x30}, 0x30, 0x0) gettid() 08:33:16 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = geteuid() getresgid(&(0x7f0000000700), 0x0, &(0x7f0000001d40)=0x0) setregid(r5, 0xee00) fchown(r3, r4, r5) gettid() 08:33:16 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000000)=0x50) 08:33:16 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8113, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x29011}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) write$P9_RLCREATE(r1, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0xca, 0x3, 0x1000000000001}, 0x2}}, 0x18) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000040)={0x7, 0x4}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000180)=@ccm_128={{0x303}, "832db9aa9c05dd05", "d10ff4126b641cd14fa8c595aa86e64e", "4148eb0b", "20a17f326f776299"}, 0x28) gettid() 08:33:16 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x9, 0x40}, 0x0, 0x4, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r1, 0x40106) keyctl$update(0x2, r1, &(0x7f0000000200)="e588962a171b24ec5337bc420476e8cd549025d9f768ccc674b1c42954493fe71cfe2754c5229d4f47c065d6cecfc7fda68eef34ef5f020dc8f153978a14a7e74349f2c37b7b8cc7a58c38d256ebb03e95929164c5733c189c3b2419368bd06a9b0722bc0377bec82de3cf4625e8f9ecc64004228ea0a81399882f1a128a955af9e0a5c2d53071aa5cd3072770524d55aa118e20fa99511d87e4de65b245d45cffca1a4f378b1a6f653d44300ba441f6ba049fd2aef24559550ed8d99bd47fe448de8ef7d0789173f5c92e904cfabe60e25da7fd33573ead", 0xd8) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:16 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x848}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000040)) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f0000000140)={0x3, 0x0, 0x7deb, 0xffffffff, 'syz0\x00', 0xbd}) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 438.618069] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:16 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = geteuid() getresgid(&(0x7f0000000700), 0x0, &(0x7f0000001d40)=0x0) setregid(r5, 0xee00) fchown(r3, r4, r5) gettid() 08:33:16 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200400, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) [ 438.677246] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:16 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:16 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:16 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8300, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000040)=""/7) 08:33:16 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x2, &(0x7f0000000140)=0x2) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 438.967030] Unknown ioctl 19296 08:33:16 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000000)={0x51, 0x4, 0xfe01, {0x3, 0x2}, {0xadd2, 0x5}, @rumble={0x3ff, 0xffff}}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:16 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x244180, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @broadcast}, &(0x7f00000000c0)=0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @remote}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:16 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 08:33:16 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:17 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x202000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f00000000c0)=0x1f) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) syz_mount_image$jfs(&(0x7f0000000200)='jfs\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="65e9df9df56fc36bc3ebb4c76f8a43edf31ba17eafbaf6826d0c15ce442cf538cf9a6de7b1da7fe735ebd2599d6218925db991d7676cee4cf29ecdcfc5c225fb1170c48cccac03c3721105976b721d4d1e30d52e2d6333614eb1962d8477f0505a8e794e6a6a806fb11b4bf6eb785e4ca58e98415f79201b28ee60886987f79504d22487d3bef5adacc65b7f43f2bf76ea3257baabf498bdf5d83280b71c3551", 0xa0, 0xfffffffffffffffe}, {&(0x7f0000000540)="e19c2340422884eeb3e552481d757a8ca7db2bef1a5147573fef1f95a052de506258e3cb97e8a707f559dc7bd0474354708f49ed81443a6dde63d8c563bdb84240a0bec74e41d3f1e09a792558c47c4ee7da583f104c275d25d96ddf5c0c9a632b95534a43e612ba3f339129815798e1df11d55549e1abbd6016024d005baeb2d435b000000000000000018cd04e2e4555472e545e7a09", 0x97, 0x40}], 0x1088000, &(0x7f0000000800)={[{@nointegrity='nointegrity'}, {@nodiscard='nodiscard'}, {@noquota='noquota'}, {@resize_size={'resize', 0x3d, 0x60c2}}, {@integrity='integrity'}], [{@subj_role={'subj_role', 0x3d, '/dev/mixer\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'xgroup2\x00'}}, {@audit='audit'}, {@uid_gt={'uid>', r3}}, {@obj_type={'obj_type', 0x3d, '^nodevvmnet0nodevqcpusetvmnet0'}}, {@appraise='appraise'}, {@pcr={'pcr', 0x3d, 0x25}}, {@measure='measure'}]}) epoll_wait(r0, &(0x7f0000000340)=[{}, {}, {}, {}], 0x4, 0x200) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000040)={0x9200000000000000, 0x1b000, 0x1f, 0x1, 0x8}) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x3, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000000)=0x3) r1 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="14ad00002d000000000000000000004e04"], 0x1}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3000000000000000000000000000000000000000000000000000000000000ff2100000000000000000000000000000000fc660000000000000000"], 0x4}}, 0x0) 08:33:17 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000040)=0x6) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x77359400}}, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:17 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) tkill(r1, 0x21) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000000)={0x1ff, 0x7f, 0x1ff, 0x7fff, 0xd5, "85ec9b039c73ee78e72833700e3985a6defd3f", 0x5, 0x1}) gettid() r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x7, 0x2}, 0x0, 0x0, &(0x7f0000000200)={0x0, 0xe, 0x1f, 0xff}, &(0x7f0000000240)=0x100000001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0xffffffffffffffff}}, 0x10) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50, 0x0, 0x8, {0x7, 0x1f, 0xffffffff, 0x4000, 0x7, 0x6, 0x4bd7, 0x8001}}, 0x50) 08:33:17 executing program 1: recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000, 0x100c0, &(0x7f00000010c0)={0xa, 0x4e23, 0xfffffff8, @rand_addr="92acf80c0e6f633a44db7b960885e0f4", 0x1}, 0x1c) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:17 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f00000000c0)) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$selinux_create(r0, &(0x7f0000000200)=@access={'system_u:object_r:scsi_generic_device_t:s0', 0x20, '/usr/lib/telepathy/misMp*\xadsion-contrr\x97\xa5\x9c\x06\xb5$^\x83u\x8c\v@bJ7O%~\xce\xbe\x89\xcf~\x1d\xa6vF\xf8\xdc\xe9\'\xc9\xe6\xffC\xd2j\xd3\x9c\x03UL\x1cm\xc8', 0x20, 0xff}, 0xfe5b) gettid() ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) 08:33:17 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) tkill(r1, 0x21) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000000)={0x1ff, 0x7f, 0x1ff, 0x7fff, 0xd5, "85ec9b039c73ee78e72833700e3985a6defd3f", 0x5, 0x1}) gettid() r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x7, 0x2}, 0x0, 0x0, &(0x7f0000000200)={0x0, 0xe, 0x1f, 0xff}, &(0x7f0000000240)=0x100000001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0xffffffffffffffff}}, 0x10) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50, 0x0, 0x8, {0x7, 0x1f, 0xffffffff, 0x4000, 0x7, 0x6, 0x4bd7, 0x8001}}, 0x50) 08:33:17 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000040)) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) delete_module(&(0x7f0000000000)='\xd1\xe9\x00', 0xe00) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = dup(r1) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000040)={0x40, 0x3}, 0x2) 08:33:17 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) tkill(r1, 0x21) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000000)={0x1ff, 0x7f, 0x1ff, 0x7fff, 0xd5, "85ec9b039c73ee78e72833700e3985a6defd3f", 0x5, 0x1}) gettid() r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x7, 0x2}, 0x0, 0x0, &(0x7f0000000200)={0x0, 0xe, 0x1f, 0xff}, &(0x7f0000000240)=0x100000001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0xffffffffffffffff}}, 0x10) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50, 0x0, 0x8, {0x7, 0x1f, 0xffffffff, 0x4000, 0x7, 0x6, 0x4bd7, 0x8001}}, 0x50) 08:33:17 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[]}}, 0x0) 08:33:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:17 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0xadc9d9c7680dcbff) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0x6}, 0xff515f5cc74cc758, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0xff}, 0x0, 0xffffffffffffffff, r6, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:17 executing program 3: socket$netlink(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x7f, 0xa00) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="10010000", @ANYRES16=r2, @ANYBLOB="20002abd7000fedbdf250e0000002800060008000100001000000800010002000000040002000800010000feffff0800010008000000980004000c0007000800030006ff00000c00070008000400030000000c0001c2a5797a30000000000c00010073797a30000000002c000700080001000e000000080001000700000008000200ff030000080002000300000008000200040004001400010062726f6164636173742d6c696e6b00000c00010073797a30000000000c00010073797a31000000000c00070008000200450e00003c00090008000200ffffff7f080002000900000008000200010400000800010002000000080002000000000008000200ffffff7f0800010007000000"], 0x110}}, 0x40000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0xe2000, 0x0) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f00000000c0)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:17 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:17 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f00000000c0)) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$selinux_create(r0, &(0x7f0000000200)=@access={'system_u:object_r:scsi_generic_device_t:s0', 0x20, '/usr/lib/telepathy/misMp*\xadsion-contrr\x97\xa5\x9c\x06\xb5$^\x83u\x8c\v@bJ7O%~\xce\xbe\x89\xcf~\x1d\xa6vF\xf8\xdc\xe9\'\xc9\xe6\xffC\xd2j\xd3\x9c\x03UL\x1cm\xc8', 0x20, 0xff}, 0xfe5b) gettid() ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) 08:33:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x24f, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[], 0xb8}}, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000380)="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") [ 440.260623] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=22755 comm=syz-executor.1 [ 440.388053] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=22757 comm=syz-executor.1 08:33:18 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) 08:33:18 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) 08:33:18 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000140)={0x1, [0x81, 0x7ff, 0x9, 0x7f, 0xc3d, 0x0, 0xfff8, 0x6, 0x6, 0x1, 0x6, 0xffff, 0x9, 0x8001, 0x3, 0xfff, 0x6, 0x7, 0x4, 0x7, 0x40, 0x0, 0x9, 0x1, 0xa1, 0x0, 0x2, 0x2, 0x5, 0x4, 0xff81, 0x7, 0xfffc, 0x1000, 0x7ff, 0x6, 0x2, 0x401, 0x400, 0x7ff, 0x800, 0x2, 0xaf, 0x3, 0x7, 0x20, 0x3ff, 0x1], 0x5}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000040)) 08:33:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x6844bedad190ba9d, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0xf801, &(0x7f00000000c0)=0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:18 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001000000000000000f00000000000000310eb4abe27657c955a4a616555d7fe94abe06fe998bb3037bd80e31c5b569b6021c5957209a69d1760c4d6c8d1117ef7056e33501b9e2bd1787f8bc0668a48176eb67170eb795bb3f3d801def40101c80c8d85cbfdcbd59c5c6f35254b9f8b79fcd5b8aba004f2496"], 0x14}}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0x60}, 0x1) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, &(0x7f0000000240)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000001280)={r0, r3, 0x8, 0x1000, &(0x7f0000000280)="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", 0x5, 0x1, 0x2, 0x3, 0x7, 0x2, 0x1, 'syz0\x00'}) gettid() 08:33:18 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x1, 0xf0db, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 440.700707] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pig=22781 comm=syz-executor.3 08:33:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x4}}, 0x0) 08:33:18 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x59f36fbf66dd7041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:18 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400eeff2d00"/20], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:18 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) [ 440.908176] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pig=22786 comm=syz-executor.3 08:33:18 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) connect$llc(r0, &(0x7f0000000000)={0x1a, 0xfffe, 0x7, 0x7, 0x7f, 0x6}, 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:18 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000040)=0x4, &(0x7f00000000c0)=0x4) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:18 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) bind$tipc(r1, &(0x7f0000000040)=@id={0x1e, 0x3, 0x1, {0x4e20}}, 0x10) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:18 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x12840, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000002d000102000000000000eb0600000000"], 0x14}}, 0x0) r2 = accept(r1, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000240)=0x80) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000040)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES16, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0x4}}, 0x10) r4 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x80, 0x402000) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000100)={0x6, 0x0, [], {0x0, @reserved}}) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x4806c2, 0x0) ioctl$SIOCRSSL2CALL(r5, 0x89e2, &(0x7f0000000380)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}) 08:33:19 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x59f36fbf66dd7041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:19 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x10000, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000011}, 0x0) 08:33:19 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) 08:33:19 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x59f36fbf66dd7041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:19 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x244, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$usbmon(r2, &(0x7f0000000200)=""/197, 0xc5) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r2, 0x28, &(0x7f0000000040)}, 0x10) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x10, 0x20c306) gettid() 08:33:19 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x59f36fbf66dd7041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000000)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff010000000000000000000000005500000000000000000a00"/51, @ANYRES32=0x0, @ANYRES32=0x0, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESOCT, @ANYRES64=r2, @ANYRES16=r2, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESHEX]]], 0x4}}, 0x0) 08:33:19 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:19 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000004c0)=""/210, 0xd2, 0x4040, &(0x7f00000005c0)={0x1a, 0x339, 0x6, 0x9, 0x81, 0x0, @random="06285056fbd7"}, 0x10) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x408000) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)=0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x1c4, 0xd, 0x8, 0x802, 0x70bd2b, 0x25dfdbfc, {0x7, 0x0, 0x9}, [@generic="55189585c120de38eb60aa8b7ecc7b9c9635246a436e5bed11c32af835b82144040ff79280a8e2997fd0c1bc04fd88f68dc46bbb743bce443815824939206894d4c1342b6d4f3aa9fa6e8b2ae8ce6cefdba9294ffc6b2c792dc70eff27f62bef01ce2f43b00ea316c3892e4d1b189b7fc8083f48604ff21e10069864b89d34b9ed79a98f81204ff9e90cbeede9626978ba4cdf2ce95d7195c902ee", @nested={0x10c, 0xc, [@generic="12a3c6f02902c145be17cf9e104a2715fab9554a8526407f53f8a2390f041c1f91057ea1e6fb7cbe7355a47366e8e34b85edea390a6fd6899254e43573d4e83151025f51f626c6264782dc53b62e5554b50b98dec8cdff5ba5f559", @generic="8557e2934d390e1e37a19a7e49c86c1ab893e33f6b81883dc19fafa7058b281562f70607cd50eb94f6e6fd495fac3de8d725d636aab02828ccd5c84128a4e1050d56606fe3a00c606ff83e0829208f753139285f215d6d7cbe5112d26d607e58ff2c5d3b4ca804165794cc18b8276122c88433bbcd959ba0408a931b07594053024dbabcf0fd27b4f1c28276ef5f1112a0aa3ae3fddedce12000926bb2db2c", @typed={0x4, 0x28}, @typed={0x8, 0x84, @uid=r4}]}, @typed={0x8, 0x3b, @u32=0x200}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x40044080}, 0x41) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:19 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x5375) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) fstat(r1, &(0x7f0000000140)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:19 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x59f36fbf66dd7041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:19 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000100)=0x1ff) gettid() r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x16) r2 = socket(0x3, 0x3, 0x2) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f0000000040)=0x6c6) 08:33:20 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:20 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x59f36fbf66dd7041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:20 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="1420d4dea39a8de7b800002d00000400"/27], 0x14}}, 0x0) accept$inet6(r1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) modify_ldt$read(0x0, &(0x7f0000000200)=""/220, 0xdc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 442.379567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39587 sclass=netlink_route_socket pig=22895 comm=syz-executor.3 08:33:20 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:20 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000200)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="f867c1b8ec1f68eb07246130ebc8ecb6", @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9, 0x3, 0x7, 0x600, 0x5, 0x44460001}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(r2, 0x21, 0x80, &(0x7f0000000140)=""/66, &(0x7f0000000040)=0x42) gettid() 08:33:20 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000040)={0x1, ""/1}) 08:33:20 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfb, 0x200000}, 0xc) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000002d002ed5a88c22ce5354d79f7d01020a1f2d15180aa212a45270f3"], 0x14}}, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x9}, 0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x80000, 0x0) r3 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r4, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0xd4, r5, 0xe21, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5c78350d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x75}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2ef7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x50b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x963b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9412}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8084000}, 0x1000) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x82888400}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xc8, r5, 0x300, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x13}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8fa1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf22}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4800}, 0x40040) 08:33:20 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:20 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x59f36fbf66dd7041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:20 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) accept4$tipc(r1, 0x0, &(0x7f0000000040), 0x80000) gettid() 08:33:20 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000040)={0x1, ""/1}) 08:33:20 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:20 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201, 0x70bd25}, 0x14}}, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000200)=0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x424, 0x1d, 0x400, 0x70bd2c, 0x25dfdbfe, {0x18}, [@nested={0x410, 0x89, [@generic="7adf871b27d571a234fa07e4f48ac7bb4a31d1adef883ed04205f83a2f9e47fc6d789387c1c045ee97094e21e178ea0ecd39e13cce91e84cd9a67b56066fa4996796f28fa5e44f416b6035e23924b2df94814cc56c08a7fff1ae6f18a0937efebca8ff4639dc20649e798e718eb452250fd1fa64adff4a2d69e0a59359ddd0b7c1cac3edbf1e0e7fb7d143ba56a3fcb50213e795a2be0ffa36c51bed3f370bd12f316c10430fc732057ce07a30357bbc31811e28a99c3c5ca3", @typed={0x8, 0x86, @pid=r6}, @generic="f3cfd24942507bdb03b0d1fe2ddcef204c97cad969ec2456acdfa2175b67004055049bbc8b9ae82bf05c8d620ba430076116a42363a717a67621ad2946c7d41002b69e33c0374622ce525b85b123b106f855414b441a468c5af6f99cd2f9175820bf5575d706786a54d86aaaa844a4dc5a8f361a98ac3fe3f2304d774f4d06dc7fb3a8e777ba93d7afa301cc65469256b451a46291082be76fa240829b9d6c2a26ddc4872199958969900e13b1797714ae8ce3e6", @generic="4a9f4ea89e118fa05d27631cd74327a0cfffe9b9f61730d69e6b6784eb925af18adeda27c223c4954ddff7457ed80cc3dfd1a0eb81f2b46a1fb8d858e86ce43d6c4730f75c89b5fa91d6a5769cda72e5404f4d36c21f", @generic="6bbda4ccfec40988b58273bef8067b0ba28519062f1ae334c572954e7be4106b18cab6039c574807cba77fabe4d059bedf34e4433292694cabbc587efab5732630e3633c831d235bf842454339a24731f075297a4b8bf27f2971285919e05c23905060209a849feca68ddc67da8a2b6de98a8712451423c3253aa2d7c1ca60f93e491e57248d78b11cdf05b8da", @typed={0x14, 0x19, @ipv6=@dev={0xfe, 0x80, [], 0x1f}}, @generic="01a420f364ccde037cfb551a4a9bb8f84a840690d1d3993facfcc6f5175f52c1dfa2f54c1fbb2aca491e9a36320cca613753fb93dbad04bc0941ed2da05836c7e33875bbed8f2a631b61ac3459eb70909255387c0668f9139de00af4eab3a6df740e74a7c67d793edcbf03cde4f5729b25f4aad1fec0", @generic="be07754e6843144dd63946ca361ed93d93537753eb7b3d73dbabd7dcfffcae15191ec18be6544106ee77bbe5b85d25e7d5b00b6a66f6032da68dfef8260cca41732028c293c9ba4e926770e19f5ecc8983c01a20b1272c0cecba82b08f4934efe70b0a918d848eadeab95cba9ae4d263e89f96db63b0dd7ddf8f6bb047037865b7db8b0946c2f8ad2cdc1c29f463290834378503b7b56bebd9aa995db9a549ae2540f9f7a42bee13e2304574c303e6b6fb49ccd29712faa9565c8823ce5e2c96ae642d8de65e6fc3c95b277a4b50443fa5", @generic="c736fa4e05d20b4457203977cdda2348087854765f828fc7a5b7a1b2ae6faa511217c2b6b8351477c6663235f3efda6c505cf686b74e9b5cdc9b99c1f5839dc32e60889325e3fc259cd7095b3047bd970bc4d325dfbfe8"]}]}, 0x424}, 0x1, 0x0, 0x0, 0x2004c882}, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000181fedd77002d00f9010000000000000000000000007160c4846723d092ca498529d00503ee21e0c527b46dbd85f4e6b0549f27f93cf6a6bcef14f22067"], 0x14}}, 0x0) dup3(r1, r2, 0x0) gettid() 08:33:20 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {r4, 0xc1, "ef9172", "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"}}, 0x110) 08:33:20 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:20 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 443.139986] nla_parse: 14 callbacks suppressed [ 443.139994] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:21 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x48, 0x0, &(0x7f00000012c0)=[@exit_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000140)={@ptr={0x70742a85, 0x0, &(0x7f0000000200)=""/4096, 0x1000, 0x2, 0x24}, @fd={0x66642a85, 0x0, r1}, @ptr={0x70742a85, 0x1, &(0x7f0000001200)=""/137, 0x89, 0x2, 0x25}}, &(0x7f0000000040)={0x0, 0x28, 0x40}}}], 0xbb, 0x0, &(0x7f0000001340)="41fb7b506bf0b8698bf3bdd6c30008d478f403600a72c0b3ace6c00f92938ee903c506e66330db8d0a02bf86723903bd77d1ce568238e0bff47c1886729c675f09b3a6f623d6b73cbe15a0be3ce692a3592747269c2de910eb0ab2ef5dd439ccdee8e45c93864b738d2f2dae670cc6d702c413a8b7b5c06321795275e94ec5c52509736f65d3313e5558ef92aef9c15ae889ee7dc3f833a486723c4a7dcd4894da02157d8fca9692352e4f6e86c22cc01270b5b1173d78e4d39569"}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:21 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 443.231837] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:21 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:21 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100000000000000000000000100000000000000000000000000000000000000000000000001000000000000ca0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0x4}}, 0x0) 08:33:21 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:21 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000040)=0x2f) 08:33:21 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 443.666925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22991 comm=syz-executor.0 08:33:21 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:21 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000979200000200"/20], 0x14}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in=@initdev, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f00000000c0)=0xe8) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 443.722053] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 443.750707] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:21 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x6, &(0x7f0000000000)={r3, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000040)={r3, 0x7, 0x10}, 0xc) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:21 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff57b8c5160100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000210000000000000000000000000000000000000000000000000000000000000000000000000000000000e2173076dde5d2e20000000000000000000000000000000000000000000000000000ff2100"/106], 0xb8}}, 0x0) [ 443.913018] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:21 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000140)={0x6fb28dd58f8ece28, 0x0, 0x3, 0x7, r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f00000000c0)={0x36, 0x6, 0x0, {0x4, 0x3, 0xd, 0x0, '/selinux/mls\x00'}}, 0x36) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 443.962205] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=146 sclass=netlink_route_socket pig=23011 comm=syz-executor.3 [ 443.996143] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23013 comm=syz-executor.0 08:33:21 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x50000, 0x0) 08:33:21 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000240)="1fc9a2e30da61301a53c293ab882d6a5424d6fa5e0360aae74e5715ed9e1b9b9e3bb50c2107b85ce282cbc2d3301ae42bb49e6d9af23416bbda3874d5dd7dce9fe6e2a4d28432ddcfe8c75e71414bd5196b25925409b710a1aa1cc27146a7953ed0ab6d0348e1673794d7aa05153d75535dc28d1c9ee9aee9dfa109836f45dff10949e4df24658a38167178f4bc1266a7ee3d2e80e8b002b2fb576f1b1659a7ebf15369def9306d23e43c48e87514fb5a84541f92d91fa1fb30102d7edd0bd6465d95ea100f34fabfa0cc0bfa882823bfbdc03cd939f0b1301a4969c8a576dd889da37deb4eadb794ec044399be5f805fed0da3e70f9", 0xf6) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x3f) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000000c0)=0x44) gettid() 08:33:21 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:22 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 444.221509] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 444.344045] audit: type=1400 audit(1570782802.160:155): avc: denied { create } for pid=23026 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 444.368096] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23041 comm=syz-executor.0 08:33:22 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) gettid() 08:33:22 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:22 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:22 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r1, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x6, &(0x7f0000000000)={r2, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={r2, 0x200}, &(0x7f0000000040)=0x8) [ 444.499277] audit: type=1400 audit(1570782802.160:156): avc: denied { write } for pid=23026 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:33:22 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000004c0)=""/210, 0xd2, 0x4040, &(0x7f00000005c0)={0x1a, 0x339, 0x6, 0x9, 0x81, 0x0, @random="06285056fbd7"}, 0x10) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x408000) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)=0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x1c4, 0xd, 0x8, 0x802, 0x70bd2b, 0x25dfdbfc, {0x7, 0x0, 0x9}, [@generic="55189585c120de38eb60aa8b7ecc7b9c9635246a436e5bed11c32af835b82144040ff79280a8e2997fd0c1bc04fd88f68dc46bbb743bce443815824939206894d4c1342b6d4f3aa9fa6e8b2ae8ce6cefdba9294ffc6b2c792dc70eff27f62bef01ce2f43b00ea316c3892e4d1b189b7fc8083f48604ff21e10069864b89d34b9ed79a98f81204ff9e90cbeede9626978ba4cdf2ce95d7195c902ee", @nested={0x10c, 0xc, [@generic="12a3c6f02902c145be17cf9e104a2715fab9554a8526407f53f8a2390f041c1f91057ea1e6fb7cbe7355a47366e8e34b85edea390a6fd6899254e43573d4e83151025f51f626c6264782dc53b62e5554b50b98dec8cdff5ba5f559", @generic="8557e2934d390e1e37a19a7e49c86c1ab893e33f6b81883dc19fafa7058b281562f70607cd50eb94f6e6fd495fac3de8d725d636aab02828ccd5c84128a4e1050d56606fe3a00c606ff83e0829208f753139285f215d6d7cbe5112d26d607e58ff2c5d3b4ca804165794cc18b8276122c88433bbcd959ba0408a931b07594053024dbabcf0fd27b4f1c28276ef5f1112a0aa3ae3fddedce12000926bb2db2c", @typed={0x4, 0x28}, @typed={0x8, 0x84, @uid=r4}]}, @typed={0x8, 0x3b, @u32=0x200}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x40044080}, 0x41) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 444.586518] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:22 executing program 3: r0 = semget(0x3, 0x1, 0x8) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000180)) semctl$GETZCNT(r0, 0x4, 0xf, &(0x7f0000000140)=""/116) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f0000000040)={0x1, 0x5}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 444.635669] audit: type=1400 audit(1570782802.160:157): avc: denied { read } for pid=23026 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 444.650939] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:22 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x1}) io_setup(0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) write$binfmt_script(r1, &(0x7f0000000200)={'#! ', './file0', [{0x20, '/selinux/mls\x00'}, {0x20, '!'}, {0x20, 'vmnet1}\\*bdevkeyring'}, {0x20, '{+keyringtrustedcpusetkeyring'}, {0x20, 'cgroup2\x00'}], 0xa, "2a7d92ffaf2a5a37366d2314c5900ce49a89c813007421fc87c3ad58673cd3fbd1a24ee31997980c81cba989eb5b3a57058fcdef9e36e4d15d05e568cb4e7644619b6875803ca0d3d759b5d29584d4ed3c6fbeaaf9f62babddc7c578c9f0ff1440e4ab33aa139d2433269c480a6c5d8ad7a78e20da31eac5ea784a4bcf9176a7094b4a8ed0c70ae24a1a03670b43c8bd7a09b99003e4b906ae8616b1ac0e27c1f3787e6a42f7ab5117370a44fd1da6e95ff6c2b08c1c9bc8c78eb4f89456e8337ee6c6776b25c4164377bf1898efddf6325db65050af163b86b9ab8a06cfc4f104fc4caa245868148c8fd3dc14d5"}, 0x145) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 444.827916] audit: type=1400 audit(1570782802.160:158): avc: denied { map } for pid=23037 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:33:22 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0xffffffd6) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x58, r3, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, '\nip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x58}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x138, r3, 0x7502921588f06d8a, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x8}}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x74}]}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xa9}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x68}}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xd}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0xc}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1a, 0x4}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x20}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x73}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x39}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x48}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7f}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3ff}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x4000}, 0x40) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) gettid() [ 444.918800] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=23074 comm=syz-executor.4 08:33:22 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:23 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x1}) io_setup(0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) write$binfmt_script(r1, &(0x7f0000000200)={'#! ', './file0', [{0x20, '/selinux/mls\x00'}, {0x20, '!'}, {0x20, 'vmnet1}\\*bdevkeyring'}, {0x20, '{+keyringtrustedcpusetkeyring'}, {0x20, 'cgroup2\x00'}], 0xa, "2a7d92ffaf2a5a37366d2314c5900ce49a89c813007421fc87c3ad58673cd3fbd1a24ee31997980c81cba989eb5b3a57058fcdef9e36e4d15d05e568cb4e7644619b6875803ca0d3d759b5d29584d4ed3c6fbeaaf9f62babddc7c578c9f0ff1440e4ab33aa139d2433269c480a6c5d8ad7a78e20da31eac5ea784a4bcf9176a7094b4a8ed0c70ae24a1a03670b43c8bd7a09b99003e4b906ae8616b1ac0e27c1f3787e6a42f7ab5117370a44fd1da6e95ff6c2b08c1c9bc8c78eb4f89456e8337ee6c6776b25c4164377bf1898efddf6325db65050af163b86b9ab8a06cfc4f104fc4caa245868148c8fd3dc14d5"}, 0x145) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:23 executing program 4: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x2000) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4a2a, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x7ffc, 0x1, 0xb8c6db45677a6b95, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x266c23114b10e01f) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @bt={0x3, 0x4, 0x6, 0x4, 0x3, 0x57, 0xd, 0x9}}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = gettid() tkill(r3, 0x3c) r4 = gettid() tkill(r4, 0x3c) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) fcntl$getown(r5, 0x9) getpid() r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000000c0)='ns/ne\xb1\xa7') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f0000000140)) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r8, 0xc0105303, &(0x7f00000002c0)={0x22, 0x9, 0xf8}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff210000001000"/112], 0xb8}}, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r3, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0xd4, r4, 0xe21, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5c78350d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x75}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2ef7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x50b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x963b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9412}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8084000}, 0x1000) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="f2ffffff", @ANYRES16=r4, @ANYBLOB="20042abd7000fbdbdf250e0000000c0006000400020004000200"], 0x20}, 0x1, 0x0, 0x0, 0x4048800}, 0x24000000) 08:33:23 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux\x0fmls\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000040)={0xffffff00, 0x80, "31d4c427df89fdb48de92d9ca417fcb75c04f0ad9632c1f9", {0xe2, 0x9}, 0x3f}) gettid() [ 445.391113] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:23 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000000c0)=0xfffffffffffff001) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 445.493587] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=23092 comm=syz-executor.0 08:33:23 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 445.580893] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES16=r0, @ANYRESDEC=0x0], 0x4}}, 0x0) 08:33:23 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) msgget$private(0x0, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:23 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0xd7, "f5cbaedbe6d20eb77933c4d31194406da0cd59541350f6c968aa0e3eb2b2328086241c054e2ffe9ee4d5b057d55b078d52d4a7dcb5e5ce459c568b1f17b2b67ed8046e83fd8128f2b1ce2003572f29ec9499c8c9e1731ad87d4d7f2adc5c4ba1c4be4a43d4a029e1fb24fcdb7df5c00fb20a899ea532448bfcd69d0e776c2f2f4783a403381be9573ed64123189f66127479f9fcf657852f15c24c003983c34a538709ab0940bf3d65c47cbebd62433593bfbf5d1abe673b25e67caae9413dad5bb17b4a988a14ad5c82896287d3b8ba3dcaed8ce0f5ab"}, &(0x7f0000000040)=0xdf) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000000c0)=r2, 0x4) gettid() 08:33:23 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:23 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x1}) io_setup(0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) write$binfmt_script(r1, &(0x7f0000000200)={'#! ', './file0', [{0x20, '/selinux/mls\x00'}, {0x20, '!'}, {0x20, 'vmnet1}\\*bdevkeyring'}, {0x20, '{+keyringtrustedcpusetkeyring'}, {0x20, 'cgroup2\x00'}], 0xa, "2a7d92ffaf2a5a37366d2314c5900ce49a89c813007421fc87c3ad58673cd3fbd1a24ee31997980c81cba989eb5b3a57058fcdef9e36e4d15d05e568cb4e7644619b6875803ca0d3d759b5d29584d4ed3c6fbeaaf9f62babddc7c578c9f0ff1440e4ab33aa139d2433269c480a6c5d8ad7a78e20da31eac5ea784a4bcf9176a7094b4a8ed0c70ae24a1a03670b43c8bd7a09b99003e4b906ae8616b1ac0e27c1f3787e6a42f7ab5117370a44fd1da6e95ff6c2b08c1c9bc8c78eb4f89456e8337ee6c6776b25c4164377bf1898efddf6325db65050af163b86b9ab8a06cfc4f104fc4caa245868148c8fd3dc14d5"}, 0x145) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:23 executing program 1: stat(&(0x7f0000001880)='./file0\x00', &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001640)={0x0, 0x0}, &(0x7f0000001680)=0xc) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffff8, 0x6, &(0x7f00000014c0)=[{&(0x7f0000000140)="e0881c925d5065b8fc8a107512f6139829f82ded191a793248b36712f720d59b207f032c7527edca5b9511af2f837ecd29ec296bf8a3c063d85719dbcba3c3cbe0e03a0caf2640c7a82c197863d130672e2c6a3a721a89feee35f486a2fe0363f0c90f1b3b05885307a98238a6cdbe9cb7e09385f1a5341daf88c7367920070ace01983fd60797acd6a3682f59dff0c4d64fc02c5942905525fd709c2846cc915cad8164f1c9847fff3e51e1943c33bbb068e49853f2068948aab4a2ff", 0xbd, 0x3ff}, {&(0x7f0000000200)="c560a7899b4d2549644f8acb2e84b4be5df8e54f7173c0e749e532929aa0e94d19630c381477344a590c5d8095c80a50829b204e24b85d9d705a9d72bec5b2e65e1d9a29dae5987ade41e3f3bf34ed428aafd1ae6f19919d6ed411f0982ae08eb5a483fa5ea55e0a64cbc32977bf23285dae949fbae35795d0a420fb368413eeb79e841576176a6fbd90a8912ef41656d7ef2720c79cfc152623278444340612d116375ee6eddd1b9ac45a1d885ae92a2c695a7bb60b69ec0a65c6ed26f994f6a44c599f7bfc511f12b08f7921a5228601e1593a2170f591c215", 0xda, 0x5}, {&(0x7f0000000300)="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", 0x1000, 0x8}, {&(0x7f0000001300)="387819da55cbf39f0383d3989130d6d951ad4ce2d17bd08f9c8dc9319098705f6627c0f873b3cbc1780536db9ada48b9638b1cf647ba733d6c53a6e4bbc68dd3eeb958df2163af5124f3e66a9ff083b8aaab082f4e931a84d6bdb571e7416d654fe4f2be476ef875903aa401daab88b57a65992667380573c0f75399cc2864efcf2d3454e85592b7298b5675873b55c863726b7ba66d7db126af64214092a1a4329674f72fe1a96542031742494f73ee3e99ccaddbad1f63c46be6ab3d5f5ef312e50c6dda78b7633c63b37ec7529c5a5397701b8a3191cde0b775804224b33eb49dd5f648", 0xe5, 0x4}, {&(0x7f0000001400)="bac960752bbcf4995e52701d1a2a358517224c1684fd9258999ff9b7d9bcb9b2079badd732744f6a946aebd6a1ca2539e1258c3898ce0fbc2784b41d4796760dcc89408702fba4ef4608ab1892d8e1ec008e915cfb01", 0x56}, {&(0x7f0000001480), 0x0, 0x3}], 0x2000, &(0x7f00000016c0)={[{@errors_continue='errors=continue'}, {@acl='acl'}, {@barrier_none='barrier=none'}, {@notail='notail'}], [{@seclabel='seclabel'}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@fowner_lt={'fowner<', r0}}, {@fowner_lt={'fowner<', r2}}, {@dont_measure='dont_measure'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type', 0x3d, '/dev/audio#\x00'}}]}) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKFLSBUF(r4, 0x1261, &(0x7f0000001840)=0xffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r6 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x80400) sendto$isdn(0xffffffffffffffff, &(0x7f00000017c0)={0x4, 0xd78f, "8351b2f803b21110618662a6492215315c01914459ed7278dca214cf9c4d14eddf2e7ac6247792444a75c49e03572c4619a7ac460b25ea05de3becea10842f79b140b66050c2833892f197"}, 0x53, 0x50, &(0x7f0000001480)={0x22, 0x1, 0x7f, 0xff, 0x4}, 0x6) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r6, 0xc0305602, &(0x7f0000000040)={0x0, 0xe534, 0x3016}) 08:33:23 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x6, &(0x7f0000000040)=[{0x9, 0x20, 0x7, 0x3}, {0x1, 0x9, 0x4, 0x400}, {0x14, 0x3, 0x1, 0x1f3}, {0xec53, 0x3, 0x1, 0x4}, {0x9, 0x61, 0x4, 0x8}, {0x6000, 0x8, 0x20, 0xbce1}]}, 0x10) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:23 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e22, @multicast2}, {0x1, @local}, 0x40, {0x2, 0x4e23, @empty}, 'lo\x00'}) gettid() [ 446.071873] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=23133 comm=syz-executor.0 08:33:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f00000001c0)=0xde46) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffdc1, &(0x7f00000bfff0)={&(0x7f0000000500)=ANY=[@ANYPTR=&(0x7f0000000800)=ANY=[@ANYRESOCT=r1, @ANYPTR=&(0x7f0000000700)=ANY=[@ANYPTR, @ANYBLOB="52cdfbd789729f75b877e2dd19b951948286675b52539463d2c42ff947cd261d9cb6d45d8845c4ad68747c57d201637935db785e19010a4e748851c62c80aa65cf751b2f27b5e646b1e51522f7"], @ANYRES16, @ANYBLOB="4379954fe6621909ef61a8b0bff2da031001b7d69d7b60a56b5b63cd578fadb99d", @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES32=r1, @ANYBLOB="c9aa33655af17a1145f2a3bd4b9238fff08cc3bd465ea40c540c700562c0fd228a8524d93d17c8283712c9c57d395f38700bc07fd563d9e50e6b3b663b106250a150c5"], @ANYRESOCT=r2], @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0000210000000000000000004705a267db1865b5fe44000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000ff2100"/122], 0x4}}, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x5102, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f0000000140)=0x7) r5 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE(r5, 0x40084504, &(0x7f0000000000)=[0x5, 0x7]) 08:33:24 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='team\x1fslave_0\x00') sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff01000200000000000000000000000100000000000000000000000000008000"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:24 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:24 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x1}) io_setup(0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) write$binfmt_script(r1, &(0x7f0000000200)={'#! ', './file0', [{0x20, '/selinux/mls\x00'}, {0x20, '!'}, {0x20, 'vmnet1}\\*bdevkeyring'}, {0x20, '{+keyringtrustedcpusetkeyring'}, {0x20, 'cgroup2\x00'}], 0xa, "2a7d92ffaf2a5a37366d2314c5900ce49a89c813007421fc87c3ad58673cd3fbd1a24ee31997980c81cba989eb5b3a57058fcdef9e36e4d15d05e568cb4e7644619b6875803ca0d3d759b5d29584d4ed3c6fbeaaf9f62babddc7c578c9f0ff1440e4ab33aa139d2433269c480a6c5d8ad7a78e20da31eac5ea784a4bcf9176a7094b4a8ed0c70ae24a1a03670b43c8bd7a09b99003e4b906ae8616b1ac0e27c1f3787e6a42f7ab5117370a44fd1da6e95ff6c2b08c1c9bc8c78eb4f89456e8337ee6c6776b25c4164377bf1898efddf6325db65050af163b86b9ab8a06cfc4f104fc4caa245868148c8fd3dc14d5"}, 0x145) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:24 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000b10c4001, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket(0x10, 0x80000, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000002d000102000000000000000000000000e073fe2eb08249792f3fdce160726b0f525f5d4fedca77564bb505085a73fcd182b2ae82be97099051f149472697b551e000e56573791550f4880a3e15dbbdb8c57f07d7c04f80809ce7080029994d6c9be5ad80aac8d7ba0658"], 0x14}}, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000200)=@security={'security\x00', 0xe, 0x4, 0x558, 0x228, 0x108, 0x0, 0x0, 0x108, 0x488, 0x488, 0x488, 0x488, 0x488, 0x4, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xc8, 0x108}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x81, 0x0, "22b4fb5178b2c6a363a65730bb48bba178da491cbbf9def35207f0f028f5"}}}, {{@ipv6={@remote, @mcast1, [0xffffff00, 0xffffffff, 0xffffff00, 0xffffff00], [0xff000000, 0x1fe, 0xffffff00, 0xffffff00], 'lapb0\x00', 'ip6gre0\x00', {0xff}, {0x7f}, 0x2f, 0x8, 0x6}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x3, 0x5, 0xffffff4f}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x800, 0x53, 0x1}}}, {{@uncond, 0x0, 0x228, 0x260, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@rt={0x138, 'rt\x00', 0x0, {0x63, 0x80000001, 0x8, 0x7f4, 0x2, 0x4, [@mcast1, @remote, @local, @dev={0xfe, 0x80, [], 0x28}, @loopback, @remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0xa}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, @remote, @remote, @mcast2, @ipv4={[], [], @multicast1}, @ipv4={[], [], @broadcast}, @initdev={0xfe, 0x88, [], 0x1, 0x0}], 0xd}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xbce, 0x2, 0x93}, {0xbc4, 0x5, 0x5}, {0x6, 0x1, 0xe8}, 0x7, 0x400}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5b8) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000040)=r5) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f00000007c0)={0x6c}) gettid() 08:33:24 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) renameat2(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000014000100000000000000382f786d00020000000009000000000000000000000b000000000000100000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00002100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100000000000000000000000000000040000000000000000000000000000000000000001900000000"], 0x4}, 0x1, 0x0, 0x0, 0x480c4}, 0x0) 08:33:24 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=@raw={'raw\x00', 0x9, 0x3, 0x2e0, 0xe0, 0xe0, 0xe0, 0x0, 0x0, 0x248, 0x248, 0x248, 0x248, 0x248, 0x3, &(0x7f0000000040), {[{{@ip={@multicast2, @dev={0xac, 0x14, 0x14, 0x10}, 0xff, 0xff, 'caif0\x00', 'bridge_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xe0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x40, 0x10000, 0x1f, '\x00', 0xfffffffffffff9a3}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0xff, 0xff, 'bridge_slave_0\x00', 'ip6erspan0\x00', {}, {}, 0x0, 0x2, 0x3}, 0x0, 0x108, 0x168, 0x0, {}, [@common=@unspec=@limit={0x48, 'limit\x00', 0x0, {0x4, 0x7, 0xffffffffffffff55, 0x6, 0x504, 0x400, 0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @local, 0x1, 0x5, [0x25, 0x3c, 0x5, 0x0, 0x3c, 0x2a, 0xe, 0xc, 0x1f, 0x20, 0x1b, 0x20, 0x3f, 0x25, 0x9, 0x40], 0x0, 0x9}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x340) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x13d, 0x9}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:24 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8080, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @sack_perm, @timestamp, @window={0x3, 0x40, 0xf000}, @sack_perm], 0x5) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 08:33:24 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000004c0)=""/210, 0xd2, 0x4040, &(0x7f00000005c0)={0x1a, 0x339, 0x6, 0x9, 0x81, 0x0, @random="06285056fbd7"}, 0x10) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x408000) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)=0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x1c4, 0xd, 0x8, 0x802, 0x70bd2b, 0x25dfdbfc, {0x7, 0x0, 0x9}, [@generic="55189585c120de38eb60aa8b7ecc7b9c9635246a436e5bed11c32af835b82144040ff79280a8e2997fd0c1bc04fd88f68dc46bbb743bce443815824939206894d4c1342b6d4f3aa9fa6e8b2ae8ce6cefdba9294ffc6b2c792dc70eff27f62bef01ce2f43b00ea316c3892e4d1b189b7fc8083f48604ff21e10069864b89d34b9ed79a98f81204ff9e90cbeede9626978ba4cdf2ce95d7195c902ee", @nested={0x10c, 0xc, [@generic="12a3c6f02902c145be17cf9e104a2715fab9554a8526407f53f8a2390f041c1f91057ea1e6fb7cbe7355a47366e8e34b85edea390a6fd6899254e43573d4e83151025f51f626c6264782dc53b62e5554b50b98dec8cdff5ba5f559", @generic="8557e2934d390e1e37a19a7e49c86c1ab893e33f6b81883dc19fafa7058b281562f70607cd50eb94f6e6fd495fac3de8d725d636aab02828ccd5c84128a4e1050d56606fe3a00c606ff83e0829208f753139285f215d6d7cbe5112d26d607e58ff2c5d3b4ca804165794cc18b8276122c88433bbcd959ba0408a931b07594053024dbabcf0fd27b4f1c28276ef5f1112a0aa3ae3fddedce12000926bb2db2c", @typed={0x4, 0x28}, @typed={0x8, 0x84, @uid=r4}]}, @typed={0x8, 0x3b, @u32=0x200}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x40044080}, 0x41) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 446.663770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=23180 comm=syz-executor.0 [ 446.771998] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23184 comm=syz-executor.3 08:33:24 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=ANY=[@ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00002100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006a527a8cb07e6122016d24c7e0e6a48533a5a18b315637ccf1aa2be067d2606098e057f39dd1f0d1aefad26a1dbe99e78629f1000000000000000000000000ce9baa61ec26e4232c44d3c7dbfc2ecec7803b928ad5c0079fe5d24de3fb32b71617e5f08b"], 0x4}}, 0x0) [ 446.844549] audit: type=1400 audit(1570782804.640:159): avc: denied { sys_admin } for pid=23172 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 08:33:24 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000040)=0x7, 0x4) gettid() 08:33:24 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000004c0)=""/210, 0xd2, 0x4040, &(0x7f00000005c0)={0x1a, 0x339, 0x6, 0x9, 0x81, 0x0, @random="06285056fbd7"}, 0x10) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x408000) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)=0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x1c4, 0xd, 0x8, 0x802, 0x70bd2b, 0x25dfdbfc, {0x7, 0x0, 0x9}, [@generic="55189585c120de38eb60aa8b7ecc7b9c9635246a436e5bed11c32af835b82144040ff79280a8e2997fd0c1bc04fd88f68dc46bbb743bce443815824939206894d4c1342b6d4f3aa9fa6e8b2ae8ce6cefdba9294ffc6b2c792dc70eff27f62bef01ce2f43b00ea316c3892e4d1b189b7fc8083f48604ff21e10069864b89d34b9ed79a98f81204ff9e90cbeede9626978ba4cdf2ce95d7195c902ee", @nested={0x10c, 0xc, [@generic="12a3c6f02902c145be17cf9e104a2715fab9554a8526407f53f8a2390f041c1f91057ea1e6fb7cbe7355a47366e8e34b85edea390a6fd6899254e43573d4e83151025f51f626c6264782dc53b62e5554b50b98dec8cdff5ba5f559", @generic="8557e2934d390e1e37a19a7e49c86c1ab893e33f6b81883dc19fafa7058b281562f70607cd50eb94f6e6fd495fac3de8d725d636aab02828ccd5c84128a4e1050d56606fe3a00c606ff83e0829208f753139285f215d6d7cbe5112d26d607e58ff2c5d3b4ca804165794cc18b8276122c88433bbcd959ba0408a931b07594053024dbabcf0fd27b4f1c28276ef5f1112a0aa3ae3fddedce12000926bb2db2c", @typed={0x4, 0x28}, @typed={0x8, 0x84, @uid=r4}]}, @typed={0x8, 0x3b, @u32=0x200}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x40044080}, 0x41) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:24 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:24 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) accept4$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', 0x2000}) 08:33:25 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:25 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:25 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000004c0)=""/210, 0xd2, 0x4040, &(0x7f00000005c0)={0x1a, 0x339, 0x6, 0x9, 0x81, 0x0, @random="06285056fbd7"}, 0x10) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x408000) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)=0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x1c4, 0xd, 0x8, 0x802, 0x70bd2b, 0x25dfdbfc, {0x7, 0x0, 0x9}, [@generic="55189585c120de38eb60aa8b7ecc7b9c9635246a436e5bed11c32af835b82144040ff79280a8e2997fd0c1bc04fd88f68dc46bbb743bce443815824939206894d4c1342b6d4f3aa9fa6e8b2ae8ce6cefdba9294ffc6b2c792dc70eff27f62bef01ce2f43b00ea316c3892e4d1b189b7fc8083f48604ff21e10069864b89d34b9ed79a98f81204ff9e90cbeede9626978ba4cdf2ce95d7195c902ee", @nested={0x10c, 0xc, [@generic="12a3c6f02902c145be17cf9e104a2715fab9554a8526407f53f8a2390f041c1f91057ea1e6fb7cbe7355a47366e8e34b85edea390a6fd6899254e43573d4e83151025f51f626c6264782dc53b62e5554b50b98dec8cdff5ba5f559", @generic="8557e2934d390e1e37a19a7e49c86c1ab893e33f6b81883dc19fafa7058b281562f70607cd50eb94f6e6fd495fac3de8d725d636aab02828ccd5c84128a4e1050d56606fe3a00c606ff83e0829208f753139285f215d6d7cbe5112d26d607e58ff2c5d3b4ca804165794cc18b8276122c88433bbcd959ba0408a931b07594053024dbabcf0fd27b4f1c28276ef5f1112a0aa3ae3fddedce12000926bb2db2c", @typed={0x4, 0x28}, @typed={0x8, 0x84, @uid=r4}]}, @typed={0x8, 0x3b, @u32=0x200}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x40044080}, 0x41) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:25 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x3, 0x4) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) 08:33:25 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x40000, 0x0) ioctl(r1, 0x101, &(0x7f0000000140)="fc73b8b2b2ea54d3804d3779bb8934a3bb5e3d7fcdab675b44754f1343293f0b1498d740abbabad577b4db17c75165dba5bae6285a59b0db698147e3568eedd63909fa75291578") ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() memfd_create(&(0x7f0000000040)='cgroup2\x00', 0x8c5a520b2b9052fd) 08:33:25 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000002d00010200001a6b3c97d5ece71791754ee07e5c923d0000b0444f1af01a01699ba709ed2d252c88e0699e6d4a52faa6697ab173034ea29145c96e915fb83b4891f235d81a03fbe4d7bd5fd2c5b6af031ab16c0a92403e1b7cfe307d7e9c96204ec555cc310c334f0a2953530adf3e74b78e62a6d9cdaf5bcfa7c9653bd25bcc8e4fe2a570ba838a2bff6efc46b29c43a994f632a93c000e8211493a7082910b7fe5a13a8a6cacdbb73b20f482449c4c978d2478816fe059f5ff779466b8331d5257c13344168f33"], 0x14}}, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000200)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x4200, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000180)={{0x0, 0x3, 0xe9, 0x3, 0xe280}}) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$CAPI_GET_MANUFACTURER(r4, 0xc0044306, &(0x7f00000000c0)=0xfffffffd) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r5, 0x0}]) io_getevents(r6, 0x4, 0x1dd, 0x0, 0x0) pipe(0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x80b01, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:25 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:25 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x288401, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="c9ddb54a5e1e4b669c852b9af1e58f7bd84117110ce8a44737691a38dc724aaa46d8d8813991a79c04263bc3ab1d90a400098b6de256719eaf38cea5e51c357f5bcdf0c8bc", 0x45}], 0x1, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x96, 0x2) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80100001}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="9d442dbd7000fddbdf2501000000000000000c99fafde62f1278e369e7d6999b834100000014001462726f6164636173743d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x20}, 0x4040000) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000002c0)={0x401, 0x548973e2297810c9, 0x1, 0x1, 0x5}, 0xc) 08:33:25 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="06c5f4fe84a1a8f02c7043aa4f00", 0x10) r3 = socket(0x18, 0x0, 0xffffffffffffffff) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @dev}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000240)={@rand_addr="de3dea45da7d07f2b782667552957564", r4}, 0x14) sendmsg$nl_xfrm(r1, &(0x7f0000000340)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@getsa={0x68, 0x12, 0x200, 0x70bd2d, 0x25dfdbfc, {@in=@local, 0x4d6, 0xf, 0x3c}, [@offload={0xc, 0x1c, {r4, 0x2}}, @proto={0x8, 0x19, 0x1b0}, @user_kmaddress={0x2c, 0x13, {@in6=@dev={0xfe, 0x80, [], 0x25}, @in6=@mcast1}}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="b8000000949e01000000000000000030aaf9be0200000000000000000000000100000000000000000000000000000000000000000000000009fffff500c5ebd4", @ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff210000000000000000000000000000000000000000000000000000f97ebd264735640cb880c21e6e615f4a27f4acde141e84e6d6ee014e75"], 0x4}}, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) futimesat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)={{0x0, 0x7530}, {r5, r6/1000+30000}}) r7 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x149800, 0x0) ioctl$sock_inet_SIOCRTMSG(r7, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @rand_addr=0x800}, 0x2, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000040)='veth0_to_bond\x00', 0x1f, 0xc93, 0xc}) 08:33:25 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$IPC_RMID(r0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) timer_create(0x6, &(0x7f0000000000)={0x0, 0x24, 0x4, @tid=r1}, &(0x7f0000000040)) shmctl$IPC_RMID(r0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:25 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000040)={0x10000, 0xe03}) [ 448.182240] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=45810 sclass=netlink_route_socket pig=23268 comm=syz-executor.1 08:33:26 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="acf941b5a0d5c327075146cee385e59ddbd1fa650395dd54caa94fb39feb5575ec532bf6a84a09ecb82462649a46ee0a8e2146a820f9b116de8cd595ce6107a7", 0x40, 0x7fffffff}, {&(0x7f0000000180)="7e244fb0024c75a6bad59469667a94f67658ebf218c3e7d71d10c037cd71b462401dbec3d4d937601a8072ee0dd26b533e4bca5615d1b4a21f7741e907b10a7a5ec3c8731935935fbf253e41205d94781c1012201a825b6f283e004baaa8a06a8f498bfb9366d19fabb69265e814af26b5caa5fdf162b562", 0x78}, {&(0x7f0000000200)="a55808db4a36ccef", 0x8, 0x9}], 0x8, &(0x7f00000002c0)={[{@case_sensitive_yes='case_sensitive=yes'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@smackfsdef={'smackfsdef', 0x3d, '/proc/sys/net/ipv4/vs/am_droprate\x00'}}, {@smackfshat={'smackfshat', 0x3d, '/proc/sys/net/ipv4/vs/am_droprate\x00'}}]}) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000380)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000003c0)=r2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:26 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:26 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x8001, 0xa200) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f00000000c0)='./file0\x00', r2}, 0x10) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000040)) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:26 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$IPC_RMID(r0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) timer_create(0x6, &(0x7f0000000000)={0x0, 0x24, 0x4, @tid=r1}, &(0x7f0000000040)) shmctl$IPC_RMID(r0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:26 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 448.570247] nla_parse: 9 callbacks suppressed [ 448.570255] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 448.648497] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:26 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:26 executing program 1: r0 = socket$inet(0x2, 0x800, 0x1) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000140)={{0x0, @multicast2, 0x4e23, 0x2, 'lblc\x00', 0x3c, 0x9, 0x37}, {@multicast1, 0x4e23, 0x1, 0x8, 0x2, 0xfff}}, 0x44) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="b8200000140001000000000000000008ff0100020000000000000000000000010000000000bbdfff000000000000000a000000000083f08e0d736329f519be5bde5e1cfa0cea06d7a1ad6f29f24a703f31b47004d1ec59d77170ddfcd743f11767bfbbd5ee587a725763715a20bb6aa86d848146cc71c181ff20361acb671169c0cecedf7f671365f946d5b26bb6855aaa99b4cf112a71225f78ce5ade916bd2020b53f90339f815190db5e288dfa2c2bf4748ae0eeb465132d2108db4611379526a2aa3cc76a6ada52361273c6a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)={0xc9, 0x4, 0x9, 0x14, 0x3f, 0x3, 0x4}, 0xc) 08:33:26 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f00000000c0)=0x800, &(0x7f0000000180)=0x4) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) 08:33:26 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) getpgid(r1) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:26 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$IPC_RMID(r0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) timer_create(0x6, &(0x7f0000000000)={0x0, 0x24, 0x4, @tid=r1}, &(0x7f0000000040)) shmctl$IPC_RMID(r0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:26 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x50) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:27 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYRESHEX=r1, @ANYRES64=r0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0x4}}, 0x0) 08:33:27 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xc0d}, &(0x7f00000000c0)=0x8) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000140)={0x5, 0x0, [{0xa83, 0x0, 0x100000001}, {0x77, 0x0, 0x3}, {0x2d1, 0x0, 0x2400000000000}, {0x86d, 0x0, 0x4}, {0x17b8, 0x0, 0xf8b}]}) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:27 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f00000000c0)=0x800, &(0x7f0000000180)=0x4) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) 08:33:27 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111}}, 0x20) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:27 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000040)={0x281, 0x3}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0x7, 0x8001, 0x1800, 0x7, 0x8, 0x81, 0x8, 0x80, 0x6, 0x8}) gettid() 08:33:27 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() semtimedop(0xffffffffffffffff, &(0x7f0000000040)=[{0x3, 0xd541, 0x1000}, {0x0, 0x1ff, 0x1000}], 0x2, &(0x7f00000000c0)={0x0, 0x989680}) 08:33:27 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40000, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000002d000143000000000000000080000000"], 0x14}}, 0x0) r2 = dup2(r1, r0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x5) 08:33:27 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111}}, 0x20) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:27 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) getpgid(r1) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 449.622410] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:27 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111}}, 0x20) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 449.714023] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:27 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='\x00', &(0x7f0000000080)='cgroup2\x00', 0x94, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000540)=[{}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f00000005c0)={r3}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000000)={r3, 0x5}) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x1080000, &(0x7f0000000200)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x200}}], [{@appraise='appraise'}, {@measure='measure'}, {@fowner_eq={'fowner', 0x3d, r5}}, {@obj_role={'obj_role', 0x3d, 'cgroup2\x00'}}]}}) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:27 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = gettid() r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r4, 0x5}, 0x8) ptrace$cont(0x18, r2, 0x5, 0x2) modify_ldt$read_default(0x2, &(0x7f0000000200)=""/250, 0xfa) 08:33:27 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) getpgid(r1) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:27 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:27 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0xfffe, 0xffffffffffffff90, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RAUTH(r2, &(0x7f0000000040)={0x14, 0x67, 0x1, {0xe, 0x2}}, 0x14) ioctl$SIOCX25GCALLUSERDATA(0xffffffffffffffff, 0x89e4, &(0x7f0000000200)={0x24, "9a4f3622d8a6b6bb921855f9e0f6bf3bd8042f7fe24b203e4f6386170d6f45aad56587263cea3780c6d1e428240296f12a2fe806170b5d4263278165e149207bbd9d66fee0b3bc54f3a92a4fa5e50618efef2b2d5d21342309c867126ea7704ce7c4ed9571e18ec52803859dc50bc4701f8118d738255bc53019218533d8c75b"}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000000c0)="6156ce047743f9f06d06caf7d15dab1ee87685841be56e0064fa7e04e3f1", 0x1e) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r4, 0xc008551b, &(0x7f0000000140)=ANY=[@ANYBLOB="0500000008000000010000000180000002b7cd987ef414a08724cbd277b6a00d4f376401c80b32e1007152953e"]) 08:33:28 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="14000080000000000000"], 0x14}}, 0x0) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @local}, &(0x7f0000000280)=0x1c, 0x100800) listen(r2, 0x8) bind$x25(r1, &(0x7f00000002c0)={0x9, @remote={[], 0x1}}, 0xfffffffffffffd8f) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4001ff) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) accept$nfc_llcp(r5, &(0x7f0000000180), &(0x7f0000000200)=0x60) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0x40) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$VT_RESIZE(r6, 0x5609, &(0x7f0000000140)={0x4, 0x3, 0xe49}) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:28 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000040)={0x9, 0xfc, 0x7ff, 0xe3f2, 0x400}) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x100000) getsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_inet_SIOCGARP(r5, 0x8954, &(0x7f0000000140)={{0x2, 0x4e22, @multicast1}, {0x306, @dev={[], 0x1f}}, 0x28, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'team0\x00'}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:28 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) getpgid(r1) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 450.287939] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23414 comm=syz-executor.1 [ 450.343300] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:28 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x19672259a88a0b3}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x60, 0xa, 0x7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x15, 0x0, 0x7}, [@typed={0xc, 0x0, @u64=0x10000000000}, @typed={0x8, 0x76, @fd=r1}, @typed={0x8, 0x27, @uid=r3}, @typed={0x8, 0x11, @u32=0x8}, @generic="1270fa66b92feb8604079613f52a1c77bb1b8c8aa1eff1c518b3865761a3bb6f4a1a0d0bdf83a2a3"]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) syz_genetlink_get_family_id$ipvs(0x0) gettid() r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400081, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r4, 0x111, 0x1, 0x4, 0x4) 08:33:28 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000000)=""/71, &(0x7f00000000c0)=0x47) syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') r1 = semget(0x0, 0x5, 0x0) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000100)=""/7) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000240)=ANY=[@ANYRES64, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYBLOB="0000210000000000000000000094517da400000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000a43d2d5732ad045e25d52cf4220f81000000ff2100000000000000000000000000000000000000000000000000003fccb2bfce64d95b6d81d40afff8ab87c8d784c3f043200a7a7f93e874054fb64a1a73ec6f4780cf2c5a5387eaecab348b3425f1a251dd60f6f8e0047009dfb151a511c796eae6d6e81ba0ca3afc3f"], 0x4}}, 0x0) 08:33:28 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:28 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=0x1024) io_setup(0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xe, 0x800) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000180)={0x6, 0x9}) 08:33:28 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111}}, 0x20) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:28 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x80000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xc0804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x8}}, 0x0, 0xffffffffffffffff, r2, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:28 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2800) bind$tipc(r2, &(0x7f0000000240)=@nameseq={0x1e, 0x1, 0x3, {0x10eebb0cf3acdc5f, 0x3, 0x4}}, 0x10) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000002d000102000000000066391a6a9b7400000000000000"], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001400010000000000000085ed959eccae066c000000faff0000eaff000000000000004f62e0253f0000ffffffffffffffa8414000000000000000000000000000000a000000000040e9f87ee8a097a385c590150000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRESHEX=r3], 0x4}}, 0x0) 08:33:28 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x800) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000040)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000100)="079d46356100fa") ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180)={0x80, 0x2}, 0xc) syz_genetlink_get_family_id$ipvs(0x0) dup(r0) gettid() 08:33:28 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000200)=""/212) 08:33:28 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x18}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x18201, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x2, 0x10500) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f000001d080)=""/102372) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:28 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESDEC], 0x4}}, 0x0) 08:33:29 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x590, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000001a80)=0xe8) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000001ac0)={0x3, @null, r2}) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) connect$ax25(r3, &(0x7f0000001900)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001bc0)={{{@in6=@loopback, @in6=@local}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000001b80)=0x2a8) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r5, 0x400454cc, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f0000000640)="06c5f4fe84a1a8f02c7043aa4f00", 0x10) r6 = socket(0x18, 0x0, 0xffffffffffffffff) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @dev}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(r6, 0x29, 0x15, &(0x7f0000000240)={@rand_addr="de3dea45da7d07f2b782667552957564", r7}, 0x14) sendmmsg$sock(r4, &(0x7f0000001700)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x0, 0x1, {0xa, 0x4e23, 0x3f, @loopback, 0x7f}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)="631c53cffdd072fb48c44ab0d2122067f3a93d2feb612a8fe75437134e3c4d10effe03fb67843b1c66b17288361bf819b2ec3c378ab9993641c0b697de236f5a66c7113e6234d13c1959476364252222f1897c22aed8440139f2de51b504b6d2d3f181c39603d43db37f03db5f62bb00726c64af78db0b519f4630132e3b96fb06afd697b15b4a9137b1e8a070aa52f68f3e1c2e56438c4e51bfa0cbce7d783be7ff76801ad158446f34fa07c90e632c2835e761c38192d10d7b75e3061eaaa4d81600e791a7b7a1762e8a766fd1b9df16ddf81dbbb56cc9a6f6b09b1815af4b9321a1559630cddc717ce6f8", 0xec}, {&(0x7f0000000300)="1dac54003ba13e16ce2bd2340d3d1c1e6ab66d8177f545505f1587097e4997690615758c4d35b7ff5e814ccbe1c3c73c3ddeaec4cab98d511b540007bd6ab0e00880391910074608ddc0c0b7d8a2c378b0a257f56ae6e020d4fb332922c12f21f9824f9f24ac9eb026ab35035ae39dff6d883377bc9a8aea8be907349515b4369ec3784017f205cf6fb802e82978a7b1", 0x90}], 0x2}}, {{&(0x7f0000000140)=@xdp={0x2c, 0x0, r7, 0x1}, 0x80, &(0x7f00000014c0)=[{&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="d2a6bbee141c0b36118cc73dd3b1891a81f6a62c9c898cb49f8415849fdd8346b96457d51667017358a5220bc97347b42ef1272c08ddd3bc2f115b77dfa5074ed789bfde91096210c18841d417551da8fb6a33b78ff9d415f03990e50e978ef95b2b899639f0203aa515d7a9df4e22c6dc585ad821c98e8f99953d988bcc0dac4f35b93005143f2c7345a6d62c8bdb494974f738071ace8bd9dcc8169600c233651663ee95340aa59ae4edb7bda809e12d388fd4b2970ebea2f19982a81c454d0370e86a091915bf75b9dfe9e39f15264f1b925b60ba81ce3a08a786a2888da232783ffb14", 0xe5}], 0x2, &(0x7f0000001500)=[@timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x4e}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x90}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000015c0)="cf151991a0348c03d43207c124da9fc6fb82883520573994043bb734a43b51ab6e15bf522d869f076109210975f74cbad856", 0x32}], 0x1, &(0x7f0000001640)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x7fffffff}}, @timestamping={{0x14, 0x1, 0x25, 0x10000}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xb81}}], 0x90}}], 0x3, 0x840) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) syz_genetlink_get_family_id$ipvs(0x0) gettid() 08:33:29 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100ef560000000000000000000001a40df90f80b1562378930000000000000000000000000000000000000000000000000100000000000000cd7f87cc2db2e6961580e3d11a08ac9567745705d5c961a25c541d2c48c67315a5297d826a2c056b27eab6bd7771df5c793f61240c3c23ce67c2037ac68dd3558ac0bc035ffdede7be0109593678ec9e6e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:29 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:29 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111}}, 0x20) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:29 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x9, 0x1, 0x1, 0x1, 0x101, 0xce6}, &(0x7f00000000c0)=0x20) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 451.404733] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:29 executing program 2: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000200)=""/212) 08:33:29 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x18000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xb2c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x4000, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000002d0001020000c500000000000000744b4fba79a4000000000000002a44b1ab88e8f703658b303c8edae59a8c724262e36cfe7f97274f72e4bd6cbe"], 0x14}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x6, &(0x7f0000000000)={r4, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={r4, 0x1fd}, &(0x7f0000000200)=0x8) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x80, 0x0) fsetxattr$security_evm(r5, &(0x7f0000000300)='security.evm\x00', &(0x7f0000000340)=@ng={0x4, 0x1, "7053a425a91ce40be3040f51c8526a3b"}, 0x12, 0x2) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) connect$ax25(r0, &(0x7f0000000140)={{0x3, @null, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null]}, 0x48) bind$x25(r1, &(0x7f0000000380)={0x9, @remote={[], 0x0}}, 0x12) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:29 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111}}, 0x20) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:29 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f0000000040)={0x81, "f720de6c761eadbf8760f48e4959c5c079d33195a6ff799ccadcbe904df6b9d4", 0x1, 0x3}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:29 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000040)={0x10000, 0xe03}) 08:33:29 executing program 2: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000200)=""/212) 08:33:29 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)="8c73cc0a4a7fb8", 0x7) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r4 = semget(0x0, 0x97d7fdc050306f9d, 0x200) semctl$GETPID(r4, 0x3, 0xb, &(0x7f0000000300)=""/185) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000040)=0x800) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:29 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:29 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x100000) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000008", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x6, &(0x7f0000000000)={r4, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@rand_addr="104b0b11a522095e4daef6b75a1c9766", @in=@remote, 0x4e20, 0x4daa, 0x4e20, 0x0, 0xde95f5dd4ce7e315, 0x10, 0xe0, 0x4, r6, r8}, {0x5, 0x2, 0x0, 0x0, 0x7ff, 0x8, 0x9, 0x80}, {0x4, 0x800000, 0xfffffffffffffffe, 0x80}, 0x3, 0x6e6bb7, 0x0, 0x1, 0x2}, {{@in6=@mcast2, 0x4d4, 0xac76398cfe552a06}, 0x2, @in=@local, 0x3500, 0x1, 0x1, 0x6, 0x9, 0x7, 0xfbe}}, 0xe8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000000)={r4, 0x2}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r9, 0x1, 0xff}, 0xc) 08:33:29 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000040)={0x2f, @loopback, 0x4e24, 0x4, 'sed\x00', 0x1, 0x100, 0x70}, 0x2c) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 451.987981] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:29 executing program 2: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000200)=""/212) [ 452.106664] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 452.119406] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=301 sclass=netlink_route_socket pig=23540 comm=syz-executor.4 08:33:30 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:30 executing program 1: socket$packet(0x11, 0x2, 0x300) uname(&(0x7f0000000000)=""/124) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001010000000000000000ff010002000000000000000000000001000000000000000000000000000000000010501e2a754682620000000000000a00000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="00002100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eeff000000000000000000000000000000000000ff210000000000000000000000000000000000000000000000001000"], 0x4}}, 0x0) 08:33:30 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000040)) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x80, 0x0) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000140)=0x8) gettid() 08:33:30 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4010000, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:30 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:30 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000100)=0x1) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES64=r1, @ANYRESDEC=r2, @ANYRESHEX=0x0, @ANYRES32], @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0x4}}, 0x0) 08:33:30 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x2001000, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000140)={{0x2, 0x4e21, @empty}, {0x4}, 0x2, {0x2, 0x4e24, @loopback}, 'bond0\x00'}) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000040)=""/29) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xe847eeaf1f87b08d}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xe8, r4, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="83da451a8181c35bf4276288b20bd522"}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x400}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3441280165d19330}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x6505b418545449c4}, 0x80) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:30 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x4, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000010) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:30 executing program 2: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) io_getevents(r3, 0x801, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCSBRKP(r5, 0x5425, 0x80000000) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$void(r6, 0xc0045878) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x5) gettid() r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_udp_int(r7, 0x11, 0x0, &(0x7f0000000180), &(0x7f0000000200)=0x4) 08:33:30 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:30 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000180)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x14}}, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r5, 0x400454cc, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f0000000640)="06c5f4fe84a1a8f02c7043aa4f00", 0x10) r6 = socket(0x18, 0x0, 0xffffffffffffffff) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @dev}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(r6, 0x29, 0x15, &(0x7f0000000240)={@rand_addr="de3dea45da7d07f2b782667552957564", r7}, 0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@ipv4={[], [], @multicast2}, r7}, 0x14) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x200000, 0x0) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r9, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="01000000b38f54074868af", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r9, 0x84, 0x6, &(0x7f0000000000)={r10, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000280)={0x3, 0x8000, 0xffffffff, 0x46, r10}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r11 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() ftruncate(r11, 0x6) 08:33:30 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[]}}, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="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"], 0x738}}, 0x0) connect$rds(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$GIO_UNIMAP(r5, 0x4b66, &(0x7f00000009c0)={0x4, &(0x7f0000000980)=[{}, {}, {}, {}]}) 08:33:30 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x8, 0x40, 0x100000000, 0x4, 0x10001, 0x3f, 0x7, 0xb2, 0x7, 0x10001, 0xffff, 0x1, 0x3f, 0x6, 0x10000, 0x1c], 0x4, 0x80}) getpgid(0xffffffffffffffff) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000040)) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:30 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) socket$unix(0x1, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r4 = socket(0x10, 0x803, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r5, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 453.082021] netlink: 1812 bytes leftover after parsing attributes in process `syz-executor.1'. [ 453.082575] audit: type=1400 audit(1570782810.900:160): avc: denied { map } for pid=23592 comm="syz-executor.2" path="socket:[80438]" dev="sockfs" ino=80438 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=unix_dgram_socket permissive=1 08:33:31 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1d) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='nfsd\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xf5, "0581acd21f49d500bf7cfffe0d36f9dc50d9c6e336db6c0e2684a90744a0f0f6fec48884db3526d81fe195af51f6d554d126ec603fbcf272062ffef72cca1bff8b6d6f0edc4e05931848b702ba972091827483bb235626396ee99c4e6bb7ca597d07e47908274132d70bbadc142ee58c49c4246bb5ebe685d9d1ad5469c809d116544b9168aa7cb8b2c73bee42c67ac6ffb68c93a229c48feaf9f7f4e24e6dd916b10e9464933d968de52a9c71ee3073eaeab301406c5d72a118c2a70aea479ab7870a7a4d483f0c2c3f5eaabc745f5fcdbddfa2a47e3a61a26b90b96209cb375d282175625067a31d4b55035823ad02f3cc1ec371"}, &(0x7f0000000300)=0xfd) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e21, 0x4, @rand_addr="857cc08408e618b736617fbdee2ed5a1", 0x80000001}}, 0x1e, 0x1}, 0x90) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x6, 0x181d40) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r5, 0xc04c5349, &(0x7f0000000140)={0x7, 0x3, 0x7ff}) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/relabel\x00', 0x2, 0x0) syz_open_procfs$namespace(r4, &(0x7f0000000040)='ns/pid_for_children\x00') openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 453.225179] netlink: 1812 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:31 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x4, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000010) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:31 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f038b0604000800080008000400ff7e", 0x24}], 0x1}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000210000000000000000000000005be59875c7badf417910af85bd9f0000000000000000000000000000000000000000007f0000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000c721840f0ef61ef64a47e9bc7160ea4f6de0342ed2aa7a71d0c9db7ec1c4f3532ac1152c1914f9e375f3171ff35f690bb04acc4699d3025403f613eccdf300"/188], 0xb8}}, 0x0) 08:33:31 executing program 2: semget(0x1, 0x1, 0x93) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) gettid() r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RMKDIR(r2, &(0x7f00000000c0)={0x14, 0x49, 0x1, {0x50, 0x4, 0x2}}, 0x14) 08:33:31 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) socket$unix(0x1, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r4 = socket(0x10, 0x803, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r5, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:31 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000200)={{0x94, 0x5}, 'port0\x00', 0x90, 0x100030, 0xffff, 0xff, 0x6, 0x3, 0x81, 0x0, 0x0, 0x2}) socket$inet(0x2, 0x806, 0x1) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:31 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000040)=0x81) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:31 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000001c0)=ANY=[@ANYRESOCT=r1, @ANYRES32=0x0, @ANYRESHEX=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f5ffffff0000000000000000000000000000000000000000ff2100000000000000000000000000000000000000000000000000004394e8d7680b358751eedc9ce2bc595f0882b3fdfe4ba6639967e5b8b39e8cbddb41371246f5075787f7ec8d8d11231af1cc1a8e97df7a7682ae"], 0x4}}, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) 08:33:31 executing program 2: semget(0x1, 0x1, 0x93) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) gettid() r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RMKDIR(r2, &(0x7f00000000c0)={0x14, 0x49, 0x1, {0x50, 0x4, 0x2}}, 0x14) 08:33:31 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x4, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000010) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:31 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b8000000140001000000000000620dfc210104020000000000000000000000010000000000000000000000000000000400000000000000000a00000000000000692a4fa9fbb69bb0ae08a6f8ebf3f7fc166d3f4e8a298e0fbd0b16008a59c10422aab6", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xb8}}, 0x0) 08:33:31 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000180)=0xffffff96, 0x4) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002bc0)=[{{&(0x7f0000000200)={0xa, 0x4e20, 0x2, @loopback, 0x1}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000240)="025b4a4666f31eae05bd0d40f7eef7e1c11f5ee0ab5cfd33dcc1eb8f18472306a5fa8c18e35e95fe180f27642cceffef3ca93884bf3aa919596d1007c38d750610f4973d5d6a8a41eaf72118f93ef8a8af7cdb94881a7da0e1a0a779422e2ca38c4c188977", 0x65}, {&(0x7f00000002c0)="50b9cb51e5a80b136401cc605e3290f54b666721dddf7f09d694e1d0d94d4b3d19d54e98b32f656b805543b65db35b3944d50d0e4c90fd5db77c4b88da251dd7fe96700d99b62f61c4f2b2", 0x4b}, {&(0x7f0000000380)="dc8507e4a7c58865a26d298017939371597a3b85d14dc793860fe7bb7df38e7ef8ad44e76d910d2fa295fbab0dc6cedebd1ec5e378094c452758f0d552a9", 0x3e}, {&(0x7f00000003c0)="1e97d1186a8111c56002d6421f8e0ef46d5c319be5e63a6c5e641216a4ee6a9ba2d944a12d8c6484dbd5642aa7e491572898da4d6bde9bb173f5d2c9d794bce826f1fc076120543956dc332eb71da9098a4f027517b9edd3405f9c21ccac2b78", 0x60}], 0x4, &(0x7f0000000480)=[@dontfrag={{0x14, 0x29, 0x3e, 0x9}}, @rthdr_2292={{0x58, 0x29, 0x39, {0x1d, 0x8, 0x2, 0x9, 0x0, [@empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, @local]}}}, @rthdr={{0x68, 0x29, 0x39, {0x2c, 0xa, 0x0, 0xfd, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1, @mcast2, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}}}, @rthdr={{0x28, 0x29, 0x39, {0x3a, 0x2, 0x0, 0x15, 0x0, [@ipv4={[], [], @multicast1}]}}}], 0x100}}, {{&(0x7f0000000580)={0xa, 0x4e24, 0x6, @ipv4={[], [], @empty}, 0x200}, 0x1c, &(0x7f0000000980)=[{&(0x7f00000005c0)="3cbcd3a5d277aa62047437f56f12dbbc88e54cb6ad26f0b6fbd4045a78a862c1f1dacd210ebe5640f08b27383b777506831395f0ec9ad5639a4efc2781d400b5079742c26e589edb4c3a450bc801", 0x4e}, {&(0x7f0000000640)="9d2eaf088a2019237ecea64f13543210db54b5624ec8879e6fe416e233fe5d388adc4352d59ba9e288bfcbd97d0d", 0x2e}, {&(0x7f0000000680)="6d799e4394c6e98f651e52c4f77df1466fda8b79", 0x14}, {&(0x7f00000006c0)="c324a09a014579d64094a1bf31e2d0a7271dabdc596975f3fc1260804e6148076b98af7556cab62b8a5a8b9b440a20ea5878a93f367b40abd6a528dd29bf726f", 0x40}, {&(0x7f0000000700)="a5e62732e593c6066bad2c3bbaa8ffff4885c28918d485a732efe2a28c3323e4130bd2a1", 0x24}, {&(0x7f0000000740)="b8139ab72bbe9cc8718b098ea25d884dd00289f4f6ebde9955cc6ea84bca229c7b177119a300b812e1e07f8d0a8779406f8e373f6ed484fd81b376fc46544aa71bffd355535728cdf5d5c6bb6d4715c6e5586904aba21a180229", 0x5a}, {&(0x7f00000007c0)="427be25608f86072c38b392fc5e6e46c9d91ed", 0x13}, {&(0x7f0000000800)="240ba72c7ed9833e649a421ec548a2b7e7b14dd1f25a6db3c2af183278f15574a8bf6ece20bc47eb9e44e9d0e1204d804b73bed5800dc78cfd4cdbf794cdf79b641087c5d127362b5cdf8cade9e6a1e0ea8314b49611ff53bbe735ac47dc00034dee290b", 0x64}, {&(0x7f0000000880)="d199a968625a79d737519f387a08505af7593af88763bb3f03cf941fbd6cfffcac72fb0e034ec214e3b9f0d0b06790b7a91d62bc034bef4757f08889ea3b1d4c243a221959c2e9435d70e87365382fc23402576ac57ae4a686cb64706f0b4c3d027684afafa259bd4ff499446d5aee7d064ea271a7f2c07de8dc94686c7a92ae6a14f7291aba985d03cc0820d90f8715044b6df98e31907df8af5c46c7e6b1d728a8d6466ab2fbd96ca51496cf65b950f844e8add70fb2e3781b820049f9732e6d69ca465bf4e64af350f4f9b3d9e8bee224cde21780e9ab6d9a6ff28c7bcf", 0xdf}], 0x9, &(0x7f0000000a40)=[@dontfrag={{0x14, 0x29, 0x3e, 0x3f}}], 0x18}}, {{&(0x7f0000000a80)={0xa, 0x4e22, 0xa0000000, @empty, 0x2}, 0x1c, &(0x7f0000000f80)=[{&(0x7f0000000ac0)="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", 0xfb}, {&(0x7f0000000bc0)}, {&(0x7f0000000c00)="b193f4a4efd79ffe2fec2351bb589273937b5ac75337059d4b70b5c21b385bd1f88a663ef5dc67e46ae22f50ed4c2710", 0x30}, {&(0x7f0000000c40)="52325c3c8c649f74b545ad13e10706affbf94074f2795f30a26994f534f28ee98040a1e75961744bee70cd48533858d764a3085a5c2be3d56f245e704fec0aea6267e144796e6bff44fc9a92a7f76bb70190c23134f8091617b264c247bba75d4bbd9c856c4e2a2ad55f26ca42602e1a92396d1c1fe9f110f915bada0a7ab1d0cefa0b1f20a5e6c8a7e9e2dff2e0989027b120e6f382ce207ff0b140251571f662cd33df255fed384ee204ca99a69d511c57bfcb1f99cb08c211f0f57a55ea", 0xbf}, {&(0x7f0000000d00)="2625e0dc93695fdbcec75111242e0054629a95b8965735a77da3c2e2940b1026ef2198725e5a8c1b02b3875ade6faabc4debdf860953d98ffd50dcbaa3f800ade769e3b48bfeee5d167cd30774e1e355b2c81740bfd4fd4aaf15041dc44339c90515f462086b7003", 0x68}, {&(0x7f0000000d80)="1a1223b3b7bd301023854b9a7960a484392bdaf6f6066676ff7e84", 0x1b}, {&(0x7f0000000dc0)="eb9972da2bbed9231eadc2c7d121aaf4bbf67708e1e3c2ec2a9110df8c765f9f7b502eeef9d4279f9e1ae6a3f18fbb58e54be27332ea728d48a6feffdb77e100eba6f10c849254087a8e7377e75436421735c6283782a87e8838617c1ec83eeb7da12a70a60afcfe64be2afa2a45c0627bb557c8ee4ad43e79fafc908959d7a086ffc358811d407d80cea70df89c8f2b55a293443c0a79edf6ebaee9e497ced9", 0xa0}, {&(0x7f0000000e80)="68ccd782d1bd6066ac48353cfb0ff4d5aa2d0f9dcc5fa1e3fdad4940d8c3bd659cafd85ea81225246a91864bfc2cc79662b3adae85b00e76317ea3c9fddfc69811683210680344e1855a27c896d8cb9775da76eabd5a7b81d94766d3d5319c0f9f69cfd35eebd1592fce7192c6b044ba322c5d1a15af824c377c17cebdd5c3fc2704db2436dea4f14182f50b55d36edf176f39760ef8ff8e3291625c03ab1ea4bad8d5f3cde97489d36effd65250d8b1db6eec739881e9fa73bce4eec8e90fa07e2ac744dab280427893d12d0033384987", 0xd1}], 0x8, &(0x7f0000003d00)=[@tclass={{0x14, 0x29, 0x43, 0x1}}, @tclass={{0x14, 0x29, 0x43, 0x73e}}, @dstopts={{0xc0, 0x29, 0x37, {0x3b, 0x14, [], [@calipso={0x7, 0x20, {0x81, 0x6, 0xb2, 0x9, [0x3, 0x5, 0x800]}}, @calipso={0x7, 0x18, {0x3f, 0x4, 0x0, 0x9, [0x100, 0xfff]}}, @calipso={0x7, 0x28, {0x1f, 0x8, 0x3, 0x4, [0x0, 0x0, 0x7ff, 0x7]}}, @hao={0xc9, 0x10, @ipv4={[], [], @rand_addr=0x700000}}, @ra={0x5, 0x2, 0x999}, @calipso={0x7, 0x28, {0xf55, 0x8, 0x3, 0x3, [0x7, 0x8de, 0x100000000, 0x7]}}]}}}, @tclass={{0x14, 0x29, 0x43, 0x3}}, @hopopts={{0x1070, 0x29, 0x36, {0x3a, 0x20a, [], [@generic={0x0, 0x1000, "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"}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x48, {0x3f, 0x10, 0x0, 0xfff8, [0x1f, 0x7, 0x5, 0x2, 0x4, 0x3, 0x200, 0x1000]}}]}}}, @rthdrdstopts={{0x58, 0x29, 0x37, {0x1ffec3bb15725c22, 0x7, [], [@padn={0x1, 0x2, [0x0, 0x0]}, @padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x28, {0x7, 0x8, 0x4, 0x6, [0x7, 0x80, 0xfffffffffffffff8, 0x3ff]}}, @ra={0x5, 0x2, 0x80}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x11d0}}, {{&(0x7f00000021c0)={0xa, 0x4e24, 0x2, @local, 0x9}, 0x1c, &(0x7f0000002780)=[{&(0x7f0000002200)="b234abefd89ca05f815594c44606a7aec8d2da2350a39f18cfceb116d2aae8f45f4f73cb594e8f7ca2d57a570b60a45143c796203ac1a483e21bf6ed688ed2357cb11b434981b3bfc60b49282f59448119a572886fa4819df2db5c46e938e4653580c285d54da0844f69bb4d8df84e348d7d567aac9ea32da0f980a097ed8f48072be94300d8eab308b3cc6d1e6b4b1e52912dfce2dd31cb790da7daee1be18997d0fa2425e128a6642931a8acdc87211fbdf76e78ae3849b609d20609ab5d9b72edbd86b3b9cde0c9a78df23eb88e1368817a", 0xd3}, {&(0x7f0000002300)="b4475d823d27a1439495fa8f987717c2c7cf08083c7d4de2f898283b11d5acd0e6b5f1a7b718327b95b8992752b9bf268457f52e3eca156d8203c69ad8f5d30694771270baf3942f42daf1c4ef6b2d849bf371152e0b25c62a754ca23e6104ff6102a49e209bccd567375eea61063d7d7e855f33a5cea1a0d93404969ef52fb277bed8f0ab8e2a5bc5", 0x89}, {&(0x7f00000023c0)="437a9fe766d1c30c370c1475c138e67d3ac30a23d47ff352665b8e34cf0e8425165e81414ec619d6742b50f9cf313ebe3a66b78d289f9e8bc6984958b48a500a5518532d646dcd6c83fee05e46586247499abd45bb423c1804f626f2becf12726d3174a70f920de07c15316d684a274190b1f16dd62a5986208a934e660e75095480ecad55948d72b8890643cf3cb398bf83ddf1506dfbc048df7ad3582e3142fca6c113332dbaba3a97dc7ca71dbb815624757300187ab5f935a78afcb324878b163a46f165013af6ab8465d3454fdb2f673938ec34d5fee3d3c8e2cc", 0xdd}, {&(0x7f00000024c0)="9557ef68218f12d226f1e404548bd5ee37d709a9bbe8f74e7fd53c2f748b68af867792cf11f9146cb4f194d1098d49e400931e3eff36a074230ab7fc6921875948941299a077546da971bb338612d51b45501f26c430e10fc4ddba222f4be35a0184e86a4defabe7b4f6f28ddacd30c292c5bdd4cb56492ab36c36c5c37cd825cd1ee85dc90babf86592ef74264b4c68ed1acf18d5b08b8d801303c1b670761084908adb20dfde25f43ff5de6db89fa206375e1e78cfa1344ca7a4e8cd670dadbce5640598b4972c69f4bb01f478ec28b17454f95de9378cc044433a18190a780709de4253c9bf07a737ed36", 0xec}, {&(0x7f00000025c0)="9f71c59fef8e4ee83f6198ee18fbcdd4e853462a0008f43c117b31b5c07af49150c24228d61d1237caeb596c7abdedb228a8f7fd", 0x34}, {&(0x7f0000002600)="1736189443be323a2541a55a7d27462469ce604921d7acfb52394f2e17b932714bcf7f48d0e172b5c3c6bb4c93749b441575097646236be4fd372182cd9dac246387de657d935734e282503036602925df5675de51b704e4ab733d32ac24a68e638036c7e1f8fda9f913e9d742bcddbd5d1153f4c6be83ab7062c76f5b1ddeee86ffb9d00dd2f2f52fb0773b1eb27bbf6ba5be3d98a969bec2f5bb5964c28b463b25332c06eb402fae5647792a2047d4", 0xb0}, {&(0x7f00000026c0)="8fe67ad007ea5a59251c648c6acab3a2f2b2ab853f5b9b29f877b56dad4fe0913a8654", 0x23}, {&(0x7f0000002700)="89205e73f5831bc1a0c968dcbe55ae65936b30387a6e04b584f1f6040eefab378df783555b04d8cc7161c8d61497786e094c1d6afea57c66106bc01e3f7257c2b158dfa16e8c475e607ae4aff41cfcd781a0896704ed076f2fa2482b9c36b1a2581eabb5b503ae173c66ed7b9aae", 0x6e}], 0x8, &(0x7f0000002800)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x200}}], 0x18}}, {{&(0x7f0000002840)={0xa, 0x4e24, 0x101, @loopback, 0x5}, 0x1c, &(0x7f0000002b80)=[{&(0x7f0000002880)="5b71ab5a460286", 0x7}, {&(0x7f00000028c0)="4b19840342a7fc71e234322b07820f274dd059c6b6b3e695204dc0fe4bdd73f33d1ed54f313460a66ca126a61f9bb0cb73779a8055bb782e3019d570ee9169f1c96719557c752fd7f42bf2cc322d12040dc51d6fd875283ef11418f84bc7a5b3681bfb4fdf2cb4d498944cd343208719f40ce4b574c07e7cecc424500d486e50a926625b2278d035d02e05311e79adf7f986dcd4e8014c7db3453b658db5a403ee2da2f075132a60bdc765830d4859f6bca4a6f63476f8ce2fbd7586c0f869fcaac2f1e4", 0xc4}, {&(0x7f00000029c0)="8a6ff82918eb615809a591c802649a4682d3c73b780396d268388861697b2b0cb92e3a9dda8b76a0d9c72d440188c37609466cc20cf3dd69e15c56968618da1f14a41da61682cf5acf3701dc4bbf8e3b700d2749a7347dc9329331cd90e83981844244b147ddb15a064a710157a0626bc0cf91807c1cfdec68d057220ebe87679cd4be7c55a7b67361ee73612c3f53b7ecb4b189042027f4d088b9367f3647d0451de09b18b11cd478a65d4aabc71b4a664f58fff19181b83182b2cfda71ce25400832ff4a83394e5990d9", 0xcb}, {&(0x7f0000002ac0)="9ca3f07da5fba154ad5f27c80071362d0e1db0091e10ef077f6850882d883d1a6e8ae0cd6b17461548cfae3acf12301692eaed524b7e154f29d42752582784505a0045f874aeae09e16566f851c855f9e8f0a286ab94acdacb6ce7ffb0f66ab699960a5faaa0ae464b95df4b1eeff65a6865e5968dcb2286d78c5efe592d1727a1412302ab8cd6b8cafaf706e9a335696b44f074bb3e860d22f864e1d404029f14660a", 0xa3}], 0x4}}], 0x5, 0x4000) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f00000000c0)=0x8, 0x4) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000140)=0x4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) chdir(&(0x7f0000000040)='./file0\x00') r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f0000002d00)=""/4096) openat$md(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/md0\x00', 0x400000, 0x0) 08:33:31 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0xfff, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f00000000c0)=[{{0x77359400}, 0x3, 0x1, 0x1}, {{r1, r2/1000+30000}, 0x1, 0x2, 0x8}], 0x30) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:31 executing program 2: semget(0x1, 0x1, 0x93) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) gettid() r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RMKDIR(r2, &(0x7f00000000c0)={0x14, 0x49, 0x1, {0x50, 0x4, 0x2}}, 0x14) 08:33:31 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) socket$unix(0x1, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r4 = socket(0x10, 0x803, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r5, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:31 executing program 0 (fault-call:4 fault-nth:0): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 454.100781] nla_parse: 1 callbacks suppressed [ 454.100789] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:32 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x6, &(0x7f0000000000)={r4, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={r4, 0xac, "69f6db4fe63b51372170129ddb63cef497d92114d456d92aed43da3070c4e8f4057cc3be613e8b5ffc8261a3896a341766f4985f45d3ba5250f2eb26cdb2f7cf35c52f28bf745005bcb938ffb37fcaf73f1d3babeb8ade3398e48f9379846d411b0010723b528848a03b29f060b2f770e168d7693ccab7c18cfe364b4617ea3e24b6c02d4c8cad9e0f48ea01480dab8e75b6935772c0a5903deba753e02a2ac5c217ed192f45a44ed1086c77"}, &(0x7f0000000280)=0xb4) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000002c0)={r5, 0x5b71b8b3}, &(0x7f0000000300)=0x8) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') accept$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0}, &(0x7f00000003c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000400)={@mcast2, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7, 0x0, 0x2b, 0x400, 0x0, 0x1020000, r7}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x218010}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r6, 0x0, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) 08:33:32 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040)=0x1, 0x4) pipe(0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000000c0)='dummy0\x00') prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:32 executing program 2 (fault-call:10 fault-nth:0): pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 454.431034] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:32 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 454.574176] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 454.652841] FAULT_INJECTION: forcing a failure. [ 454.652841] name failslab, interval 1, probability 0, space 0, times 0 08:33:32 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) fstat(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f0000000140)="3f97c6562b84de8e53ce51909d3e401d1dd7372c007787a20ec0b9d1cb27ce0caee8dc0bd602b12b2d72b757bb3f58a510cb268ee34af72f62f4e0bbd6cf9e6203717d2225b0bf69a710b6e84dab996938b5122e231f05acdafc335a3e", 0x5d, 0x1ff}, {&(0x7f0000000200)="a39e226ba7a371b3da39bff9d64d017d3578b37bb99d6a30", 0x18, 0xffff}, {&(0x7f0000000240)="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", 0x1000, 0x80000001}, {&(0x7f0000001240)="98d71f28c94cf0b68eeb7ae68f3c232fd79d3a950529c206cd975e7a6d354039a0bb5e4163027abb43d465c06be56b2da4f4fb07286abcc1690e2e57791d5977fc74132a38ca925849d03f9ebe793328bffbd5e8107ea1b59972470605a2521e0b5960ba9d0390f5f12eb851b7a72f8f205e09cbc6c7170c8a8e7a79cb2c1d693ab6f182c165672f08b7225eb57cc6e0919eedc0bb9fb531a9366753f7fc28aa6246277fe76ca1f57f4da5d4dca8a14f546d0e815ab9b1d67a2608d60f62a9d67cd77bed", 0xc4, 0x40}], 0x1000000, &(0x7f0000001440)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@usefree='usefree'}, {@dots='dots'}, {@fat=@sys_immutable='sys_immutable'}], [{@fsname={'fsname', 0x3d, '[em1cgroup*selinux}'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x66, 0x30, 0x0, 0x35, 0x7a08a4a8d6e8b0fc, 0x35, 0x66], 0x2d, [0x61, 0x4e, 0x32, 0x38], 0x2d, [0x35, 0x0, 0x36, 0x64], 0x2d, [0x39, 0x2d908e423348a817, 0x34, 0x31], 0x2d, [0x65, 0x62, 0x65, 0x63, 0x66, 0x65, 0x64, 0x33]}}}, {@obj_type={'obj_type', 0x3d, 'cpusetem1'}}, {@euid_gt={'euid>', r1}}]}) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:32 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000700000000000000000000000000000000000000000000000000000014a558402b15ced18c56c2cd79413ff7000000000000000000000000003d5427b566ffc3f700000000000000000000000000000000000000000000000000000000ff21000000000000000000000200000600"/128], 0xb8}}, 0x0) [ 454.741555] CPU: 0 PID: 23706 Comm: syz-executor.0 Not tainted 4.14.148 #0 [ 454.748728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.758102] Call Trace: [ 454.760735] dump_stack+0x138/0x197 [ 454.764444] should_fail.cold+0x10f/0x159 [ 454.768638] should_failslab+0xdb/0x130 [ 454.772694] __kmalloc_track_caller+0x2ec/0x790 [ 454.777415] ? __sb_end_write+0xc1/0x100 [ 454.781512] ? strndup_user+0x62/0xf0 [ 454.785359] memdup_user+0x26/0xa0 [ 454.788932] strndup_user+0x62/0xf0 [ 454.792587] SyS_mount+0x3c/0x120 [ 454.796065] ? copy_mnt_ns+0x8c0/0x8c0 [ 454.799974] do_syscall_64+0x1e8/0x640 [ 454.803900] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 454.806976] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. [ 454.808771] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 454.808783] RIP: 0033:0x459a59 [ 454.808788] RSP: 002b:00007fe5c905ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 454.833813] RAX: ffffffffffffffda RBX: 00007fe5c905ac90 RCX: 0000000000459a59 08:33:32 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040), 0x10) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$selinux_access(r2, &(0x7f0000000140)={'system_u:object_r:auditctl_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x5}, 0x49) 08:33:32 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0xffffffffffffff14, 0x0) [ 454.841107] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 454.848404] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 454.855707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5c905b6d4 [ 454.862996] R13: 00000000004c62c9 R14: 00000000004db250 R15: 0000000000000005 08:33:32 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x12bb0dbbd1a1cb7c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000002d000102000000000000000000000000ea8c6bbebaa64debdeff4532d4ff045f768f118f868f43d0d818ed412180472c6ea9e0ff58eb209f7bdc170e8b"], 0x14}}, 0x0) fallocate(r1, 0xb9be92150fe07589, 0x299eba87, 0x2) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:32 executing program 0 (fault-call:4 fault-nth:1): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:32 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:32 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff010002000000000000000000000000000000000000000000000000000000000a00002d490000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000210000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000051ad9bc51611581b00"], 0xb8}}, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000000)) [ 455.148490] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:33 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 455.195090] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:33 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) unlink(&(0x7f0000000000)='./file0\x00') io_setup(0xfffffffe, &(0x7f0000000040)=0x0) io_getevents(r1, 0xa61, 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000000100)={0x0, 0x1c9c380}) [ 455.420799] FAULT_INJECTION: forcing a failure. [ 455.420799] name failslab, interval 1, probability 0, space 0, times 0 [ 455.442805] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:33 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = open(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) accept$alg(r2, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) ftruncate(r1, 0x10099b7) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 455.474570] CPU: 0 PID: 23738 Comm: syz-executor.0 Not tainted 4.14.148 #0 [ 455.481635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.481642] Call Trace: [ 455.481661] dump_stack+0x138/0x197 [ 455.481682] should_fail.cold+0x10f/0x159 [ 455.481698] should_failslab+0xdb/0x130 [ 455.505436] kmem_cache_alloc+0x2d7/0x780 [ 455.509617] ? check_preemption_disabled+0x3c/0x250 [ 455.514659] ? __might_fault+0x110/0x1d0 [ 455.518753] getname_flags+0xcb/0x580 [ 455.522584] ? __might_fault+0x110/0x1d0 [ 455.526664] user_path_at_empty+0x2f/0x50 [ 455.530843] do_mount+0x12b/0x27d0 [ 455.534413] ? copy_mount_string+0x40/0x40 [ 455.538665] ? _copy_from_user+0x99/0x110 [ 455.542840] ? memdup_user+0x58/0xa0 [ 455.546682] ? copy_mount_options+0x1fe/0x2f0 [ 455.551193] SyS_mount+0xab/0x120 [ 455.554679] ? copy_mnt_ns+0x8c0/0x8c0 [ 455.558593] do_syscall_64+0x1e8/0x640 [ 455.562500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 455.567377] entry_SYSCALL_64_after_hwframe+0x42/0xb7 08:33:33 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 455.572593] RIP: 0033:0x459a59 [ 455.575784] RSP: 002b:00007fe5c907bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 455.575796] RAX: ffffffffffffffda RBX: 00007fe5c907bc90 RCX: 0000000000459a59 [ 455.575802] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 455.575807] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 455.575813] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5c907c6d4 [ 455.575820] R13: 00000000004c62c9 R14: 00000000004db250 R15: 0000000000000005 [ 455.627466] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:33 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x8}, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:33 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r1, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x6, &(0x7f0000000000)={r2, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={r2, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYRES32=r3, @ANYBLOB="3e00000090c4c0961c61f5f92c9ef239a41ebe1d8d452fb21ada2789a91e07b7257b0afc592616d1f7a81c49eb3a7656461b956c0405a076ba99a484114bc9a1072e8f5fa2f10e920c76e490"], &(0x7f0000000200)=0x46) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:33 executing program 0 (fault-call:4 fault-nth:2): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 455.856447] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:33 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 08:33:33 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) socket$inet6(0xa, 0x7, 0xfe) gettid() 08:33:33 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000140)=@tipc=@name, 0x80, &(0x7f0000000040)=[{&(0x7f0000000200)=""/130, 0x82}, {&(0x7f00000002c0)=""/108, 0x6c}], 0x2, &(0x7f0000000340)=""/113, 0x71}, 0x10000) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:33 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 456.028888] FAULT_INJECTION: forcing a failure. [ 456.028888] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 456.040865] CPU: 1 PID: 23783 Comm: syz-executor.0 Not tainted 4.14.148 #0 [ 456.049121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.058518] Call Trace: [ 456.061139] dump_stack+0x138/0x197 [ 456.064813] should_fail.cold+0x10f/0x159 [ 456.069001] __alloc_pages_nodemask+0x1d6/0x7a0 [ 456.073705] ? fs_reclaim_acquire+0x20/0x20 [ 456.078250] ? __alloc_pages_slowpath+0x2930/0x2930 [ 456.084269] cache_grow_begin+0x80/0x400 [ 456.088379] kmem_cache_alloc+0x6a6/0x780 [ 456.092564] ? find_held_lock+0x35/0x130 [ 456.096670] getname_flags+0xcb/0x580 [ 456.100598] ? __might_fault+0x110/0x1d0 [ 456.104714] user_path_at_empty+0x2f/0x50 [ 456.108912] do_mount+0x12b/0x27d0 [ 456.112501] ? copy_mount_string+0x40/0x40 [ 456.116787] ? _copy_from_user+0x99/0x110 [ 456.120969] ? memdup_user+0x58/0xa0 [ 456.124727] ? copy_mount_options+0x1fe/0x2f0 [ 456.129261] SyS_mount+0xab/0x120 [ 456.132763] ? copy_mnt_ns+0x8c0/0x8c0 [ 456.136690] do_syscall_64+0x1e8/0x640 [ 456.140615] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 456.145498] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 456.150807] RIP: 0033:0x459a59 [ 456.154013] RSP: 002b:00007fe5c907bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 456.161763] RAX: ffffffffffffffda RBX: 00007fe5c907bc90 RCX: 0000000000459a59 [ 456.169054] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 08:33:34 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f00000000c0)={"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"}) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000600)={r3, 0x0, 0x9, 0xa4d8d1c, 0x8}) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r5 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f0000000640)=0x0) io_submit(r6, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r5, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') r8 = socket$unix(0x1, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r9, 0xc02c5341, &(0x7f0000000680)) sendmsg$TIPC_NL_NODE_GET(r5, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0xd4, r7, 0xe21, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5c78350d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x75}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2ef7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x50b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x963b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9412}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8084000}, 0x1000) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f00000004c0)={0xa8, r7, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xc1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'bond_slave_0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9a3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x10000030}, 0x24009020) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) [ 456.176393] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 456.183731] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5c907c6d4 [ 456.191114] R13: 00000000004c62c9 R14: 00000000004db250 R15: 0000000000000005 08:33:34 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:34 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:34 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xffff}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0x2}, 0x8) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:34 executing program 0 (fault-call:4 fault-nth:3): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 456.358129] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:34 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f00000000c0)=0x10000) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000280)={0x2, 0x8, 0xb7a2, 0x5, 0x0, 0x56d}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000240)) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x2, 0x0, 0x3f, 0x2, 0x0, 0x7, 0x82400, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x7, 0x19}, 0x9022, 0x26f1, 0x1b, 0x1, 0x8, 0x81, 0x2}, r1, 0x1, r5, 0x5) gettid() 08:33:34 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:34 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peek(0x3, r1, &(0x7f0000000000)) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff010002000000000000000000000001000000000000000000000000000000000000f0aa0b0000000000000a0000260000000085120b7528648f9f7838cf4616a8f20781ccc2b5f270984597e314a96113ce23fcee344e0143a9442b023c8357158c13f0f251f10a6fb74dad3d1649c7b76dade85eb9408803d451215e13b64b4deb5525534ff9d5a4795617beb2c328fc694854755d0d57b2febe2628436ed86f6f96d50363dedd5f5c1aec7d209f2e07808235812fe4b0c5817e3736f6d88f7577886d09e2791c3ee78aa00dea3f91532da01d95b55fa68e4d3547e72a409e9f975f2091cbd6de0995785568ec", @ANYPTR64, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0x4}}, 0x0) [ 456.651599] FAULT_INJECTION: forcing a failure. [ 456.651599] name failslab, interval 1, probability 0, space 0, times 0 [ 456.683495] CPU: 0 PID: 23828 Comm: syz-executor.0 Not tainted 4.14.148 #0 [ 456.690699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.700063] Call Trace: [ 456.700088] dump_stack+0x138/0x197 [ 456.700108] should_fail.cold+0x10f/0x159 [ 456.700129] should_failslab+0xdb/0x130 [ 456.706443] kmem_cache_alloc+0x2d7/0x780 [ 456.706461] ? lock_downgrade+0x740/0x740 [ 456.706478] alloc_vfsmnt+0x28/0x7d0 [ 456.726686] vfs_kern_mount.part.0+0x2a/0x3d0 [ 456.731214] do_mount+0x417/0x27d0 [ 456.734784] ? copy_mount_string+0x40/0x40 [ 456.739061] ? memdup_user+0x58/0xa0 [ 456.742797] ? copy_mount_options+0x1fe/0x2f0 [ 456.747332] SyS_mount+0xab/0x120 [ 456.750817] ? copy_mnt_ns+0x8c0/0x8c0 [ 456.754743] do_syscall_64+0x1e8/0x640 [ 456.758661] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 456.763556] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 456.768786] RIP: 0033:0x459a59 [ 456.772008] RSP: 002b:00007fe5c907bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 456.779748] RAX: ffffffffffffffda RBX: 00007fe5c907bc90 RCX: 0000000000459a59 [ 456.787055] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 456.795130] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 456.804771] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5c907c6d4 [ 456.812074] R13: 00000000004c62c9 R14: 00000000004db250 R15: 0000000000000005 08:33:34 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) accept$inet6(r1, 0x0, &(0x7f0000000140)) getpgid(0xffffffffffffffff) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000002d00010200e5ff0000000000000000006858f899e696e75cb43adfea93df691c23d938b65a1ababa518179e7c9c5413472a78fdce7f6b4dd3b91794c0fc59fab3bb899362d9b2a36bccd0da2217bfa9d8a96d49c4357609cb5a7bca8c67566f355c2db09e4af94f1df0a73b13e5d474c4d4d5004ae449d8e0993c481841803dadd1112ef85cd4dba926e40364a2e7c7b9f6dee7a102f937a3da2b5e01a392490c6d9ec85c4710c54436d3a30f95c33"], 0x14}}, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000040)={{0x6b, 0x5, 0x52, 0xd2, 0xee}}) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:34 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() open(&(0x7f0000000040)='./file0\x00', 0x800, 0x20) 08:33:34 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:34 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x14) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:34 executing program 0 (fault-call:4 fault-nth:4): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:34 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x8, 0x0, 0xe402ace603eba6c5, 0x3}) ioctl$DRM_IOCTL_AGP_BIND(r4, 0x40106436, &(0x7f0000000100)={r5, 0xf79}) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r6 = socket$unix(0x1, 0x2, 0x0) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r7, 0x118, 0x0, &(0x7f0000000080)=0x3, 0x4) r8 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 08:33:34 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000002d0001020000000000030000000000000a026c4bc223ce8543146be94b0108cc2157d41e020e7d02e9c3effc696b2d60d4631ece7747bd112717e3905cbc4cb1fc80a436b0ef15a4fc7678baced250e6d142cec0900668379a0548b10f7f111b0aeb217bf654982946b97e34221b7b1390dcbb63d99c4dd6496299c6ffb7efafa933d77ae8c9c99f8366393ebaac11806ccb8cf95bb86f9342ade031de46bd1099945ca6be59188ee42652faa3294f77734e70868e2479b1b95ff28979f5bc5c2b8af5b5a4974c1c607c8f447f2e5ab8519789dbb0c1fe613534dda86df42343a140542fc124bcf974962c37a8e8242f1902e99bc45223ae24c7f0284ff8c4774f0bc9516321b40e7ab1fa4f2e993e34eb7ca74d17c76cdee11c0000"], 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000125bd7000fcdbdf25020000002400060008000100070000000800010006000000040002000400020008000100948800000c00020004000400040004003800060008000100080000000400020004000200040002000800010000000000080001000200000004000200084d01000100000004000200"], 0x7c}, 0x1, 0x0, 0x0, 0x8080}, 0x9000) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0xb, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0xa}}, 0xfffffffffffffec7) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000680)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @in6={0xa, 0x4e20, 0x8, @remote, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r4, 0x7ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x9e, @local, 0xf0}, @in6={0xa, 0x4e21, 0x80000000, @loopback, 0x9}}}, 0x118) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r7, 0x400454cc, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f0000000640)="06c5f4fe84a1a8f02c7043aa4f00", 0x10) r8 = socket(0x18, 0x0, 0xffffffffffffffff) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @dev}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(r8, 0x29, 0x15, &(0x7f0000000240)={@rand_addr="de3dea45da7d07f2b782667552957564", r9}, 0x14) r10 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@empty, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4e20, 0x5, 0x4e24, 0x6, 0xd, 0x4edd3111abe1dbcb, 0xb0, 0x32, r9, r10}, {0x6, 0xb600000000000000, 0x6, 0x3, 0x1, 0x2, 0x200, 0x500000000}, {0x2, 0x100, 0x800, 0x2}, 0x0, 0x6e6bb5, 0xd56387a13493d770, 0x0, 0x1, 0x2}, {{@in=@remote, 0x4d5, 0xf6182161964b7b4b}, 0x51e7a2681945bb9a, @in=@multicast1, 0x34ff, 0x0, 0x3, 0x3f, 0x6, 0xcdd, 0x4}}, 0xe8) 08:33:34 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) gettid() [ 457.136807] audit: type=1804 audit(1570782814.950:161): pid=23872 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir332317208/syzkaller.nPxNEH/796/file0" dev="sda1" ino=18804 res=1 08:33:35 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 457.256294] FAULT_INJECTION: forcing a failure. [ 457.256294] name failslab, interval 1, probability 0, space 0, times 0 [ 457.282310] CPU: 1 PID: 23864 Comm: syz-executor.0 Not tainted 4.14.148 #0 [ 457.289500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.298924] Call Trace: [ 457.301548] dump_stack+0x138/0x197 [ 457.305214] should_fail.cold+0x10f/0x159 [ 457.309433] should_failslab+0xdb/0x130 [ 457.313441] kmem_cache_alloc_trace+0x2e9/0x790 [ 457.318153] ? trace_hardirqs_on_caller+0x400/0x590 [ 457.323205] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 457.328000] kernfs_mount_ns+0x67/0x790 [ 457.332016] cgroup_do_mount+0x9e/0x270 [ 457.336017] ? init_cgroup_root+0x310/0x310 [ 457.340372] ? cgroup_mount+0x690/0x8b0 [ 457.344363] ? cgroup_get_live+0x1/0x200 [ 457.348443] cgroup_mount+0x789/0x8b0 [ 457.352267] ? cgroup_attach_task+0x6c0/0x6c0 [ 457.356796] mount_fs+0x97/0x2a1 [ 457.360198] vfs_kern_mount.part.0+0x5e/0x3d0 [ 457.364716] do_mount+0x417/0x27d0 [ 457.368281] ? copy_mount_string+0x40/0x40 [ 457.372533] ? memdup_user+0x58/0xa0 [ 457.376275] ? copy_mount_options+0x1fe/0x2f0 [ 457.380804] SyS_mount+0xab/0x120 [ 457.384286] ? copy_mnt_ns+0x8c0/0x8c0 [ 457.388200] do_syscall_64+0x1e8/0x640 [ 457.392108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 457.396977] entry_SYSCALL_64_after_hwframe+0x42/0xb7 08:33:35 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = getpgid(0x0) getpgid(r1) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d367b67d64eaf9fcb2d4e854a879f361f7449b5676f576fa442686924c1ffae71fd60820d262e82359ee6f16c48ac2aeb92bff05a8641ffd01740f06181ae6354eb2db42c75d8bd3fbdfc161dadef1ab9c51da7afbb8d297246abe3bd6efde18fd5bcb85fa3d8a4200b09a47fce52fb63b796393d4bd8636cf30461315caca35b237ecd841b359fc4958bbea2ca8a5efe484f27cd0ec40fc3e7604adff16eb9f038033653f659ae5972cd547e18ad8faf06998fffb27f69a28d1", 0xba}], 0x1}, 0x4000) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:35 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x208000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f00000000c0)=""/252) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x2288, &(0x7f00000002c0)) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xa, 0x80010, r4, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000002d000102000000000000000000000000ed676ee3b4a4a49df5e3d484d50fe129"], 0x14}}, 0x0) sendmsg$nl_generic(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0xb0, 0x2d, 0x201, 0x0, 0x0, {}, [@nested={0x9c, 0x34, [@typed={0x10, 0x9, @str='/dev/dsp\x00'}, @generic='p2', @generic="9ed50b4d0ffa225eb691f399e367919a53ba201c516d58a420e79bc16792402522926f59026e850f02d699cdbeb1973ca53f32b3d66c76161548f37099b695a665ad5591ee0d61c7486743261393a12ef8766f76034e6eb6a7d595a7dd94c56157582ce9e53f1be9223c2c5f101b10937a0a852baaa874a44d8f8708340eb94c7725c016ff"]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x8001}, 0x0) pread64(r5, &(0x7f00000001c0)=""/231, 0xe7, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/108], 0xb8}}, 0x0) [ 457.399001] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pig=23892 comm=syz-executor.5 [ 457.402173] RIP: 0033:0x459a59 [ 457.402179] RSP: 002b:00007fe5c907bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 457.402190] RAX: ffffffffffffffda RBX: 00007fe5c907bc90 RCX: 0000000000459a59 [ 457.402208] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 457.402213] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 457.402217] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5c907c6d4 [ 457.402222] R13: 00000000004c62c9 R14: 00000000004db250 R15: 0000000000000005 [ 457.454587] audit: type=1804 audit(1570782814.950:162): pid=23872 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir332317208/syzkaller.nPxNEH/796/file0" dev="sda1" ino=18804 res=1 08:33:35 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 457.489451] audit: type=1400 audit(1570782815.280:163): avc: denied { map } for pid=23894 comm="syz-executor.1" path="socket:[81716]" dev="sockfs" ino=81716 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_route_socket permissive=1 08:33:35 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0xc2a80, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8151, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, r1, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r2 = timerfd_create(0x85eb6cfef67ebf43, 0x80000) ioctl$USBDEVFS_REAPURB(r0, 0x4008550c, &(0x7f0000000180)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) poll(&(0x7f0000000140)=[{r2, 0x2}, {r3, 0x100}, {r4, 0x70}], 0x3, 0x8) io_setup(0x0, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mmap$usbfs(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8, 0x4008010, r6, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000040)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 457.645251] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=60004 sclass=netlink_route_socket pig=23899 comm=syz-executor.4 08:33:35 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:35 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0x4}}, 0x4000002) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x100000000, 0x200040) r2 = socket(0x10, 0x3, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) splice(r1, &(0x7f0000000040)=0x5a, r2, &(0x7f00000000c0)=0x8, 0x9, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x90240, 0x0) r4 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r5, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r4, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0xd4, r6, 0xe21, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5c78350d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x75}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2ef7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x50b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x963b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9412}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8084000}, 0x1000) sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000200)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000000380)={0x294, r6, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2c3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_MEDIA={0x130, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x363}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x364}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5bb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffff9fa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3800000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3b0}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 08:33:35 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x80800) getpgid(0xffffffffffffffff) r4 = syz_open_dev$midi(&(0x7f0000001280)='/dev/midi#\x00', 0x9, 0x20001) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f00000012c0)=0x80000000, 0x4) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1, 0x1f, 0xe4, 0x9, 0x0, 0xff, 0x40000, 0xb, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7fffffff, 0x5bf524048ae307e1, @perf_config_ext={0x7fff, 0x6}, 0x140, 0x6, 0x6, 0x3, 0x9}, r5, 0xa, 0xffffffffffffffff, 0x2) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) read$rfkill(r7, &(0x7f0000001240), 0x8) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000200)={'nat\x00', 0x1000, "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"}, &(0x7f00000000c0)=0x1024) ftruncate(r1, 0x7fff) gettid() 08:33:35 executing program 0 (fault-call:4 fault-nth:5): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:35 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000000)='keyringlo\'\x00', 0x1, 0x105, &(0x7f0000000080)={0x6, 0x10001, 0x594, 0x9, 0x1, 0x4, 0x2, 0x204000000}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 08:33:35 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000000)={0x20, 0x1, 0x0, 0xfffc, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r1, 0x4008550c, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:35 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x200, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGBITKEY(r4, 0x80404521, &(0x7f0000000200)=""/102396) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:35 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 458.103700] vhci_hcd: invalid port number 252 08:33:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r2 = gettid() tkill(r2, 0x3c) setpriority(0x0, r2, 0x7f) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_GET_LOW_DMA(r5, 0x227a, &(0x7f0000000100)) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x6, &(0x7f0000000000)={r6, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000000)={r6}, 0x8) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) 08:33:36 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x5, 0x1, 0x5000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) getpgid(0xffffffffffffffff) r2 = socket(0x10, 0x3, 0xff) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() geteuid() 08:33:36 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 458.304944] FAULT_INJECTION: forcing a failure. [ 458.304944] name failslab, interval 1, probability 0, space 0, times 0 08:33:36 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@local, 0x77, r1}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 458.348619] CPU: 0 PID: 23939 Comm: syz-executor.0 Not tainted 4.14.148 #0 [ 458.355702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.365079] Call Trace: [ 458.367701] dump_stack+0x138/0x197 [ 458.371361] ? vprintk_func+0x65/0x159 [ 458.375286] should_fail.cold+0x10f/0x159 [ 458.379476] should_failslab+0xdb/0x130 [ 458.383492] kmem_cache_alloc_trace+0x2e9/0x790 [ 458.388196] ? lock_downgrade+0x740/0x740 [ 458.392668] sget_userns+0xfe/0xc30 [ 458.396328] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 458.401052] ? kernfs_sop_show_options+0x190/0x190 [ 458.406017] kernfs_mount_ns+0xe9/0x790 [ 458.410060] cgroup_do_mount+0x9e/0x270 [ 458.414072] ? init_cgroup_root+0x310/0x310 [ 458.418432] ? ns_capable_common+0x12c/0x160 [ 458.422880] cgroup_mount+0x789/0x8b0 [ 458.426705] ? __lockdep_init_map+0x10c/0x570 [ 458.431236] ? cgroup_attach_task+0x6c0/0x6c0 [ 458.435778] mount_fs+0x97/0x2a1 [ 458.439188] vfs_kern_mount.part.0+0x5e/0x3d0 [ 458.443724] do_mount+0x417/0x27d0 [ 458.447303] ? copy_mount_string+0x40/0x40 [ 458.451755] ? memdup_user+0x58/0xa0 [ 458.455594] ? copy_mount_options+0x1fe/0x2f0 [ 458.460128] SyS_mount+0xab/0x120 [ 458.463649] ? copy_mnt_ns+0x8c0/0x8c0 [ 458.467564] do_syscall_64+0x1e8/0x640 [ 458.471472] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 458.476542] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 458.481775] RIP: 0033:0x459a59 [ 458.484979] RSP: 002b:00007fe5c907bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 08:33:36 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x842, 0x0) setsockopt$rose(r1, 0x104, 0x4, &(0x7f00000000c0)=0x98f, 0x4) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8e72a9e8f0b2ddebd00000000000000ff010002000000000000000000000001000000000003000000150000000000000000000000000095c1734b75cb164900", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) [ 458.492712] RAX: ffffffffffffffda RBX: 00007fe5c907bc90 RCX: 0000000000459a59 [ 458.500012] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 458.507304] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 458.514597] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5c907c6d4 [ 458.522005] R13: 00000000004c62c9 R14: 00000000004db250 R15: 0000000000000005 08:33:36 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)=0x3) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:36 executing program 0 (fault-call:4 fault-nth:6): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:36 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$isdn_base(0x22, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) socket$unix(0x1, 0x2, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r5 = fcntl$dupfd(r4, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 08:33:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff0100020000000000000000000000010000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2100"/112], 0xb8}}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200080, 0x0) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0x30, 0x2, 0x1}, 0x3}}, 0x18) 08:33:36 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) socket$unix(0x1, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000180)) pipe(0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r4 = socket(0x10, 0x803, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r5, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:36 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000200)=""/218) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) wait4(r1, &(0x7f0000000140), 0x2, &(0x7f0000000380)) gettid() r2 = socket(0x10, 0x3, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000440)={0x9, 0xc, 0x18, "3ff11d10ce94867437857b0566ff4e98b1c3cb8158b4b99a7dc872595dc46d6700008a3caa540bf6378ac708d96bd36c3f429535f43a7132c24c42b7", 0x8, "cef8f784ad0d374bdba61dfbd100ff94eaee69681aecc7d8e63a18339ee747d2798b0bc32ce9f57733e68d469d90aefff51a61d1bd9b1fd3606c054e", 0xd411bcbc6b0ee416}) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r5}) 08:33:36 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = socket$unix(0x1, 0x2, 0x0) syz_mount_image$bfs(&(0x7f0000000280)='bfs\x00', &(0x7f00000002c0)='./file0\x00', 0x7f, 0x7, &(0x7f0000000840)=[{&(0x7f0000000380)="7102106d0e2fe6714298aae8eb1f0547151a21ca8754d89c36e18eb9abf7c5dc968151120697f5dee4bbfc2c4f6caf9faffa144bcb84f53b85577a04eb20aacab65889485a3a8b0420c693c37e0a43e076498d761df22139026109e3c8f3e8f9f547c4f95a01e14b1dcf5ecefa22dede5d34c21984bfb2881e4aa97883fe686b26c5901207da7e6bae531b4925cf3d03460e", 0x92, 0xb4}, {&(0x7f0000000440)="d163d6ab0edae55be89e90e53f55eb81fcc41278446a993800d138fcb67d2e3a0c89a4cc02569b8fb865c54488c7fc40a678fd908d185ac8aee2cc877403e04babb951c6e28d86e6dfae0113f2f4d7e6e12d3b496091dca085a5da920dd0090526cef93efd5288aff88bbb580e66559013e10c138794a9228b14d5601d4f844a716fbf2fa1687683eb58a2e75a10f7ebe873ffcf3df8cfa2e24747198267492d34b923793c6251517db0b080dbc2a79b1d0a70f27bf5183c096b62b9bad63dcc2b23a5646555b227b9e291a171af1a78b9598ed61218d63107c68166c38a23a73a260627fa6eb06905da423fee8392f3140d03f3", 0xf4, 0x1000}, {&(0x7f0000000540)="8b756bc06408b7c648b6a1d69dd74cb1a202687328c36ecca3f27dec21caa43ef3bb07a4dd5f18f58dd013e6aaaf3b1b76cae64a7941b8b836b711a9b52c1f51be5fbc86e7af26632d5091c1", 0x4c, 0xfff}, {&(0x7f00000005c0)="8275191c9024b0c23c3e443962560c92ff8cf1fa9d7429a387b7aefd0bb8332cc1af928e143d7439c0e8890380c91cf74b6093ffde70d20a1fdf42a291bd0e3f394b2edcb8d1dfe3c9bb25ed4cee1cfeb233e6c99f8c76807b53612981cdd9f5e5b34b4f53f4eff21700f52abbfcbaf80402647d05854b3851d4fb538025b84b29ed7980767caf0ebb2dd7533dd423b11e6a6d9469e9389fbc604a7e8650f7a7d5a6d6f582fb3489cf7ec445fd97df35b7ceaaadd3e1930f15bd09121e39e9cba7e92e10d52dbec8bf104e12ace5306711bc631368ebd8ed0315c2", 0xdb, 0xfffffffffffffff8}, {&(0x7f00000006c0)="2a50e998a55c375a661f426949e1acde7dc7c919843497cda5d9a8e15524b26c71947ea3a453775cf008981dd887914ffe7879c241a77b9330bb5e1b1e0b43f68b329d4661a03d35dd371742d7f9c3052e1ecca23a7d49b0864326411a87d878eec78d539f9293e223ed3d775f051bd8b5c29780e0", 0x75, 0xf77f}, {&(0x7f0000000740)="c26a2531511388246b2fa79bd333e305d4fe4c80aa4a25674abaceddc60b8b960da0909920996f24809df295787bcb55ef0462d452f5153ecf3e264722805c633c364c3080b83ec793acbb091a201208274700ace40aab406ce11ba14f2832c3c2eadc4df6c8d09447de4a5d8f2f0d3ee0378f0f4f6a30c0688a653ebe3d24d53a456fb25a53c79fe5b58caf08efb7ab269355c4dbe54abbed59344f6c3d36f677b79b53d26d802343109a0ce90cebfa23126b1c7af0041a5e587bc1e1465434427b649b8c", 0xc5, 0x3}, {&(0x7f0000000300)="7a3700d1c69f1947f59dbcb3ffc38290838fb1fabd40c781ce59ce070f43c90ef141ea05c87f89581d7c88a6a9ddef19f9d41e3869da7359bc1f3a", 0x3b, 0x7}], 0xa91b9f0cac2eafe9, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000240)=0x7fff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) r3 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000200)={r5, 0x20}, 0x8) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f00000000c0)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 459.111810] nla_parse: 8 callbacks suppressed [ 459.111817] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:37 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=ANY=[]}}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x80) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) read$usbmon(0xffffffffffffffff, &(0x7f0000000180)=""/41, 0x29) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f00000002c0)={0x34a7, 0xa0000000}) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000100)={0x101, 0x100, "15d73f01ddaaf9ebe426609b9e0175efe0ba9cd5e168cb5c0520aaacba01ef4c", 0xffffffff, 0xc40, 0x1, 0xffffffff, 0x4}) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="6f010003004002280000000041000000000200000000513c8e4d00200000000000"], 0x30) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000280)={0xaa, 0x13}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f00000001c0)={0x4, 0x0, [], {0xa83a0e99ff48ba65, @reserved}}) [ 459.212811] FAULT_INJECTION: forcing a failure. [ 459.212811] name failslab, interval 1, probability 0, space 0, times 0 08:33:37 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) socket$unix(0x1, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000180)) pipe(0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r4 = socket(0x10, 0x803, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r5, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 459.277871] CPU: 0 PID: 24000 Comm: syz-executor.0 Not tainted 4.14.148 #0 [ 459.285138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.294513] Call Trace: [ 459.297135] dump_stack+0x138/0x197 [ 459.300824] should_fail.cold+0x10f/0x159 [ 459.305525] should_failslab+0xdb/0x130 [ 459.309534] kmem_cache_alloc_trace+0x2e9/0x790 [ 459.314252] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 459.319732] ? sget_userns+0xfe/0xc30 [ 459.323573] ? rcu_read_lock_sched_held+0x110/0x130 [ 459.328623] selinux_sb_alloc_security+0x46/0x220 [ 459.333510] security_sb_alloc+0x6d/0xa0 [ 459.337600] sget_userns+0x196/0xc30 [ 459.341341] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 459.346045] ? trace_hardirqs_on_caller+0x400/0x590 [ 459.351084] ? kernfs_sop_show_options+0x190/0x190 [ 459.356049] kernfs_mount_ns+0xe9/0x790 [ 459.360056] cgroup_do_mount+0x9e/0x270 [ 459.364065] ? init_cgroup_root+0x310/0x310 [ 459.368446] cgroup_mount+0x789/0x8b0 [ 459.372284] ? check_preemption_disabled+0x3c/0x250 [ 459.377334] ? cgroup_attach_task+0x6c0/0x6c0 [ 459.381868] mount_fs+0x97/0x2a1 [ 459.385275] vfs_kern_mount.part.0+0x5e/0x3d0 [ 459.390335] do_mount+0x417/0x27d0 [ 459.393917] ? copy_mount_string+0x40/0x40 [ 459.398374] ? memdup_user+0x58/0xa0 [ 459.402127] ? copy_mount_options+0x1fe/0x2f0 [ 459.406659] SyS_mount+0xab/0x120 [ 459.410142] ? copy_mnt_ns+0x8c0/0x8c0 [ 459.414072] do_syscall_64+0x1e8/0x640 [ 459.418079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 459.423053] entry_SYSCALL_64_after_hwframe+0x42/0xb7 08:33:37 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) socket$unix(0x1, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000180)) pipe(0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r4 = socket(0x10, 0x803, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r5, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:37 executing program 1: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x842, 0x0) setsockopt$rose(r1, 0x104, 0x4, &(0x7f00000000c0)=0x98f, 0x4) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 459.428263] RIP: 0033:0x459a59 [ 459.431471] RSP: 002b:00007fe5c907bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 459.439232] RAX: ffffffffffffffda RBX: 00007fe5c907bc90 RCX: 0000000000459a59 [ 459.446526] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 459.453813] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 459.461111] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5c907c6d4 [ 459.468414] R13: 00000000004c62c9 R14: 00000000004db250 R15: 0000000000000005 08:33:37 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x20800, 0x0) 08:33:37 executing program 0 (fault-call:4 fault-nth:7): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:37 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000180)) pipe(0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:37 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000380)=""/4096, 0x1000, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) exit(0x9) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000240)=""/8, &(0x7f0000000280)=0x8) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x44804) gettid() 08:33:37 executing program 1: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:37 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, &(0x7f0000000000)={0x400, 0x1, 0x40, 0x7}, 0x6) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 08:33:37 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x8}, 0x2) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) gettid() [ 459.943587] FAULT_INJECTION: forcing a failure. [ 459.943587] name failslab, interval 1, probability 0, space 0, times 0 [ 459.994544] CPU: 0 PID: 24056 Comm: syz-executor.0 Not tainted 4.14.148 #0 [ 460.001629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.011006] Call Trace: [ 460.013627] dump_stack+0x138/0x197 [ 460.017282] should_fail.cold+0x10f/0x159 [ 460.021504] should_failslab+0xdb/0x130 [ 460.025510] __kmalloc+0x2f0/0x7a0 [ 460.029083] ? __list_lru_init+0x6b/0x660 [ 460.033268] __list_lru_init+0x6b/0x660 [ 460.037263] sget_userns+0x4e0/0xc30 [ 460.041034] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 460.045738] ? kernfs_sop_show_options+0x190/0x190 [ 460.050699] kernfs_mount_ns+0xe9/0x790 [ 460.054707] cgroup_do_mount+0x9e/0x270 [ 460.058706] ? init_cgroup_root+0x310/0x310 [ 460.063051] ? ns_capable_common+0x12c/0x160 [ 460.067490] cgroup_mount+0x789/0x8b0 [ 460.071319] ? cgroup_attach_task+0x6c0/0x6c0 [ 460.075937] mount_fs+0x97/0x2a1 [ 460.079344] vfs_kern_mount.part.0+0x5e/0x3d0 [ 460.083872] do_mount+0x417/0x27d0 [ 460.087446] ? copy_mount_string+0x40/0x40 08:33:37 executing program 1: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@local, 0x77, r1}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 460.091702] ? memdup_user+0x58/0xa0 [ 460.095431] ? copy_mount_options+0x1fe/0x2f0 [ 460.099952] SyS_mount+0xab/0x120 [ 460.103449] ? copy_mnt_ns+0x8c0/0x8c0 [ 460.107352] do_syscall_64+0x1e8/0x640 [ 460.107363] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 460.107383] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 460.107394] RIP: 0033:0x459a59 [ 460.124524] RSP: 002b:00007fe5c907bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 460.132259] RAX: ffffffffffffffda RBX: 00007fe5c907bc90 RCX: 0000000000459a59 08:33:38 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000180)) pipe(0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 460.139640] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 460.146934] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 460.154255] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5c907c6d4 [ 460.161552] R13: 00000000004c62c9 R14: 00000000004db250 R15: 0000000000000005 08:33:38 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x10041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x10}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:38 executing program 1: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@local, 0x77, r1}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:38 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x5, 0x1, 0x5000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) getpgid(0xffffffffffffffff) r2 = socket(0x10, 0x3, 0xff) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() geteuid() 08:33:38 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000180)) pipe(0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r4, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:38 executing program 0 (fault-call:4 fault-nth:8): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:38 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) setsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f0000000040)=0x1, 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:38 executing program 1: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) 08:33:38 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 08:33:38 executing program 4: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040)=0x1, 0x4) pipe(0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000000c0)='dummy0\x00') prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() 08:33:38 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 460.997887] FAULT_INJECTION: forcing a failure. [ 460.997887] name failslab, interval 1, probability 0, space 0, times 0 08:33:38 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x5, 0x1, 0x5000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) getpgid(0xffffffffffffffff) r2 = socket(0x10, 0x3, 0xff) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() geteuid() [ 461.114006] CPU: 1 PID: 24111 Comm: syz-executor.0 Not tainted 4.14.148 #0 [ 461.121111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.130483] Call Trace: [ 461.133127] dump_stack+0x138/0x197 [ 461.136795] should_fail.cold+0x10f/0x159 [ 461.142107] should_failslab+0xdb/0x130 [ 461.146121] __kmalloc+0x2f0/0x7a0 [ 461.149702] ? __list_lru_init+0x6b/0x660 [ 461.153897] __list_lru_init+0x6b/0x660 [ 461.157920] sget_userns+0x500/0xc30 [ 461.161671] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 461.166512] ? kernfs_sop_show_options+0x190/0x190 [ 461.171489] kernfs_mount_ns+0xe9/0x790 [ 461.175509] cgroup_do_mount+0x9e/0x270 [ 461.179533] ? init_cgroup_root+0x310/0x310 [ 461.183858] ? ns_capable_common+0x12c/0x160 [ 461.183870] cgroup_mount+0x789/0x8b0 [ 461.183887] ? check_preemption_disabled+0x3c/0x250 [ 461.183896] ? cgroup_attach_task+0x6c0/0x6c0 [ 461.183910] mount_fs+0x97/0x2a1 [ 461.183925] vfs_kern_mount.part.0+0x5e/0x3d0 [ 461.183937] do_mount+0x417/0x27d0 [ 461.183951] ? copy_mount_string+0x40/0x40 [ 461.183964] ? copy_mount_options+0x1fe/0x2f0 [ 461.183977] SyS_mount+0xab/0x120 [ 461.225420] ? copy_mnt_ns+0x8c0/0x8c0 [ 461.229345] do_syscall_64+0x1e8/0x640 [ 461.233324] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 461.238253] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 461.243477] RIP: 0033:0x459a59 [ 461.246685] RSP: 002b:00007fe5c907bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 461.254418] RAX: ffffffffffffffda RBX: 00007fe5c907bc90 RCX: 0000000000459a59 08:33:39 executing program 4 (fault-call:2 fault-nth:0): setrlimit(0x2, &(0x7f0000000080)={0x0, 0x2000000}) munmap(&(0x7f00001db000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) 08:33:39 executing program 1 (fault-call:4 fault-nth:0): setrlimit(0x2, &(0x7f0000000080)={0x0, 0x2000000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) [ 461.261709] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 461.268989] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 461.276284] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5c907c6d4 [ 461.283578] R13: 00000000004c62c9 R14: 00000000004db250 R15: 0000000000000005 08:33:39 executing program 3: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x5, 0x1, 0x5000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) getpgid(0xffffffffffffffff) r2 = socket(0x10, 0x3, 0xff) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() geteuid() [ 461.419944] FAULT_INJECTION: forcing a failure. [ 461.419944] name failslab, interval 1, probability 0, space 0, times 0 [ 461.447327] CPU: 0 PID: 24144 Comm: syz-executor.1 Not tainted 4.14.148 #0 [ 461.454413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.456155] FAULT_INJECTION: forcing a failure. 08:33:39 executing program 0 (fault-call:4 fault-nth:9): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) socket$unix(0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() [ 461.456155] name failslab, interval 1, probability 0, space 0, times 0 [ 461.463789] Call Trace: [ 461.463818] dump_stack+0x138/0x197 [ 461.463839] should_fail.cold+0x10f/0x159 [ 461.463857] should_failslab+0xdb/0x130 [ 461.463872] kmem_cache_alloc+0x2d7/0x780 [ 461.463886] ? find_held_lock+0x35/0x130 [ 461.463896] ? get_pid_task+0x98/0x140 [ 461.463907] __split_vma+0xc9/0x6d0 [ 461.463919] do_munmap+0xb09/0xd60 [ 461.463927] ? vmacache_update+0x101/0x130 [ 461.463943] mmap_region+0x16f/0x1030 [ 461.518640] do_mmap+0x5b8/0xcd0 [ 461.522051] vm_mmap_pgoff+0x17a/0x1d0 [ 461.525971] ? vma_is_stack_for_current+0xa0/0xa0 [ 461.530926] ? wait_for_completion+0x420/0x420 [ 461.535544] SyS_mmap_pgoff+0xa3/0x520 [ 461.539562] ? find_mergeable_anon_vma+0x2c0/0x2c0 [ 461.544533] ? do_syscall_64+0x53/0x640 [ 461.548530] ? align_vdso_addr+0x60/0x60 [ 461.552645] SyS_mmap+0x16/0x20 [ 461.555954] do_syscall_64+0x1e8/0x640 [ 461.559870] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 461.564751] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 461.569964] RIP: 0033:0x459a59 [ 461.573170] RSP: 002b:00007f6aef8bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 461.581025] RAX: ffffffffffffffda RBX: 00007f6aef8bbc90 RCX: 0000000000459a59 [ 461.588406] RDX: 0000000000000403 RSI: 0000000000fff000 RDI: 0000000020000000 [ 461.595696] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 461.602996] R10: 0002000000000032 R11: 0000000000000246 R12: 00007f6aef8bc6d4 [ 461.610282] R13: 00000000004c6176 R14: 00000000004db118 R15: 0000000000000006 [ 461.619853] CPU: 1 PID: 24145 Comm: syz-executor.4 Not tainted 4.14.148 #0 [ 461.626918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.636290] Call Trace: [ 461.638918] dump_stack+0x138/0x197 [ 461.642873] should_fail.cold+0x10f/0x159 [ 461.647055] should_failslab+0xdb/0x130 [ 461.651053] kmem_cache_alloc+0x2d7/0x780 [ 461.655248] ? find_held_lock+0x35/0x130 [ 461.659419] ? get_pid_task+0x98/0x140 [ 461.663321] __split_vma+0xc9/0x6d0 [ 461.666965] do_munmap+0xb09/0xd60 [ 461.670524] ? vmacache_update+0x101/0x130 [ 461.674789] mmap_region+0x16f/0x1030 [ 461.678624] do_mmap+0x5b8/0xcd0 [ 461.682019] vm_mmap_pgoff+0x17a/0x1d0 [ 461.685941] ? vma_is_stack_for_current+0xa0/0xa0 [ 461.690829] ? wait_for_completion+0x420/0x420 [ 461.695613] SyS_mmap_pgoff+0xa3/0x520 [ 461.699530] ? find_mergeable_anon_vma+0x2c0/0x2c0 [ 461.704490] ? do_syscall_64+0x53/0x640 [ 461.708492] ? align_vdso_addr+0x60/0x60 [ 461.712578] SyS_mmap+0x16/0x20 [ 461.715882] do_syscall_64+0x1e8/0x640 [ 461.719807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 461.724698] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 461.729916] RIP: 0033:0x459a59 [ 461.733113] RSP: 002b:00007f834dc34c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 461.740854] RAX: ffffffffffffffda RBX: 00007f834dc34c90 RCX: 0000000000459a59 [ 461.748156] RDX: 0000000000000403 RSI: 0000000000fff000 RDI: 0000000020000000 [ 461.755472] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 461.762852] R10: 0002000000000032 R11: 0000000000000246 R12: 00007f834dc356d4 08:33:39 executing program 3 (fault-call:9 fault-nth:0): pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 08:33:39 executing program 1 (fault-call:4 fault-nth:1): setrlimit(0x2, &(0x7f0000000080)={0x0, 0x2000000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) 08:33:39 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) getdents64(r3, &(0x7f0000000080)=""/49, 0x31) pipe(&(0x7f00000000c0)) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$FICLONE(r0, 0x40049409, r4) close(r2) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="221d3a72646dfc288c8ce26bdfb307e4eb18ab7ec1996a1cd910acc69db6f45e7d46fcefecd976f65dad1fd51cb0dff8da1b28ef1b655ce47308e4e3eb5158445c62b8a474af393ff8e623fd476ff115d076594d344d89f0cdcdabad3bf5ac7e4ae1bfb5b175fbde25334d6ace9b468ae3c76f78196d2aa88ea02b5d0a72d302fcbb544e93d15c3c7097161f9edb4cec1c3797447141c05217155a1e0b1c05245e48b68685bb7ed84450438d6702a1f319e3", @ANYPTR, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES32], @ANYBLOB="e104554501d224131ebdda0671aff5430059a056faca264229ecb1f1989b62470af9cd9c9eaf918048429a09d132a1687ab3d88567d83927b94e16b9e25b89468b0ae185411c5e7f7e4ad95fc0f4dbc039b8cf400f68118e3b9244dc40d7b8469eeffe8a6e3572bd7e4fbb01d65a92236a34ca367efb1fed04e1c8ab32735d35222c7dcca6baddeeeb177295ccdf939510276692639caccd42312fa5a74ccc063c0878986beea7f7df40331ed27cb05d0a8e082ff0dedb42d53102412c154f9cb6116a23f6f8fdb7627a9ed7ffce", @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32], @ANYRESHEX], 0x1ac) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x3, 0x8a, [], 0x1, &(0x7f0000000100)=[{}], &(0x7f0000000140)=""/138}, &(0x7f0000000280)=0x78) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 08:33:39 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) io_setup(0x0, 0x0) io_getevents(0x0, 0x10001, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) pipe(0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000680)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) gettid() r6 = socket(0x10, 0x803, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)={0x2c, r7, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_PORT={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0xad34b696b74b4722) [ 461.770154] R13: 00000000004c6176 R14: 00000000004db118 R15: 0000000000000003 [ 461.898132] FAULT_INJECTION: forcing a failure. [ 461.898132] name failslab, interval 1, probability 0, space 0, times 0 [ 461.913444] FAULT_INJECTION: forcing a failure. [ 461.913444] name failslab, interval 1, probability 0, space 0, times 0 [ 461.937763] CPU: 1 PID: 24161 Comm: syz-executor.1 Not tainted 4.14.148 #0 [ 461.944869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.945850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29242 sclass=netlink_route_socket pig=24166 comm=syz-executor.2 [ 461.954341] Call Trace: [ 461.954381] dump_stack+0x138/0x197 [ 461.954402] should_fail.cold+0x10f/0x159 [ 461.954423] should_failslab+0xdb/0x130 [ 461.954438] kmem_cache_alloc+0x47/0x780 [ 461.954449] ? __split_vma+0xc9/0x6d0 [ 461.954460] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 461.954474] anon_vma_clone+0xde/0x470 [ 461.954491] __split_vma+0x28a/0x6d0 [ 461.954505] do_munmap+0xb09/0xd60 [ 461.954515] ? vmacache_update+0x101/0x130 [ 461.954528] mmap_region+0x16f/0x1030 [ 461.954542] do_mmap+0x5b8/0xcd0 [ 461.954558] vm_mmap_pgoff+0x17a/0x1d0 [ 462.021175] ? vma_is_stack_for_current+0xa0/0xa0 [ 462.026032] ? wait_for_completion+0x420/0x420 [ 462.030625] SyS_mmap_pgoff+0xa3/0x520 [ 462.034527] ? find_mergeable_anon_vma+0x2c0/0x2c0 [ 462.039469] ? do_syscall_64+0x53/0x640 [ 462.043453] ? align_vdso_addr+0x60/0x60 [ 462.047699] SyS_mmap+0x16/0x20 [ 462.051072] do_syscall_64+0x1e8/0x640 [ 462.055056] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 462.059938] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 462.065330] RIP: 0033:0x459a59 [ 462.068608] RSP: 002b:00007f6aef8bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 462.076334] RAX: ffffffffffffffda RBX: 00007f6aef8bbc90 RCX: 0000000000459a59 [ 462.079260] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29242 sclass=netlink_route_socket pig=24167 comm=syz-executor.2 08:33:39 executing program 4 (fault-call:2 fault-nth:1): setrlimit(0x2, &(0x7f0000000080)={0x0, 0x2000000}) munmap(&(0x7f00001db000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) 08:33:39 executing program 1 (fault-call:4 fault-nth:2): setrlimit(0x2, &(0x7f0000000080)={0x0, 0x2000000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) [ 462.083612] RDX: 0000000000000403 RSI: 0000000000fff000 RDI: 0000000020000000 [ 462.083619] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 462.083624] R10: 0002000000000032 R11: 0000000000000246 R12: 00007f6aef8bc6d4 [ 462.083629] R13: 00000000004c6176 R14: 00000000004db118 R15: 0000000000000006 [ 462.146073] CPU: 0 PID: 24151 Comm: syz-executor.0 Not tainted 4.14.148 #0 [ 462.153156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.162535] Call Trace: [ 462.165160] dump_stack+0x138/0x197 [ 462.169174] should_fail.cold+0x10f/0x159 [ 462.173357] should_failslab+0xdb/0x130 [ 462.177370] __kmalloc+0x2f0/0x7a0 [ 462.180953] ? lock_downgrade+0x740/0x740 [ 462.185171] ? register_shrinker+0xbd/0x220 [ 462.189584] register_shrinker+0xbd/0x220 [ 462.193763] sget_userns+0x9bf/0xc30 [ 462.194964] FAULT_INJECTION: forcing a failure. [ 462.194964] name failslab, interval 1, probability 0, space 0, times 0 [ 462.197496] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 462.213624] ? kernfs_sop_show_options+0x190/0x190 [ 462.218588] kernfs_mount_ns+0xe9/0x790 [ 462.222599] cgroup_do_mount+0x9e/0x270 [ 462.226649] ? init_cgroup_root+0x310/0x310 [ 462.231087] ? parse_cgroup_root_flags+0x1/0x190 [ 462.235853] cgroup_mount+0x789/0x8b0 [ 462.239657] ? cgroup_attach_task+0x6c0/0x6c0 [ 462.244176] mount_fs+0x97/0x2a1 [ 462.250424] vfs_kern_mount.part.0+0x5e/0x3d0 [ 462.254937] do_mount+0x417/0x27d0 [ 462.258500] ? retint_kernel+0x2d/0x2d [ 462.262418] ? copy_mount_string+0x40/0x40 [ 462.266659] ? copy_mount_options+0x1f9/0x2f0 [ 462.271151] ? copy_mount_options+0x1fe/0x2f0 [ 462.275652] SyS_mount+0xab/0x120 [ 462.279099] ? copy_mnt_ns+0x8c0/0x8c0 [ 462.282992] do_syscall_64+0x1e8/0x640 [ 462.286880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 462.291746] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 462.296930] RIP: 0033:0x459a59 [ 462.300112] RSP: 002b:00007fe5c907bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 462.307855] RAX: ffffffffffffffda RBX: 00007fe5c907bc90 RCX: 0000000000459a59 [ 462.315216] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 462.322592] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 462.329861] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5c907c6d4 [ 462.337266] R13: 00000000004c62c9 R14: 00000000004db250 R15: 0000000000000005 [ 462.353425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24175 comm=syz-executor.5 [ 462.378693] CPU: 1 PID: 24174 Comm: syz-executor.3 Not tainted 4.14.148 #0 [ 462.385808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.394148] FAULT_INJECTION: forcing a failure. [ 462.394148] name failslab, interval 1, probability 0, space 0, times 0 [ 462.395463] Call Trace: [ 462.395489] dump_stack+0x138/0x197 [ 462.395520] should_fail.cold+0x10f/0x159 [ 462.417280] should_failslab+0xdb/0x130 [ 462.421281] kmem_cache_alloc+0x47/0x780 [ 462.425350] ? __lock_is_held+0xb6/0x140 [ 462.429416] ? check_preemption_disabled+0x3c/0x250 [ 462.434462] dst_alloc+0xf3/0x1a0 [ 462.437943] rt_dst_alloc+0x73/0x440 [ 462.441701] ip_route_output_key_hash_rcu+0x731/0x2750 [ 462.447024] ? check_preemption_disabled+0x3c/0x250 [ 462.452073] ip_route_output_key_hash+0x1c0/0x2e0 [ 462.456969] ? ip_route_output_key_hash_rcu+0x2750/0x2750 [ 462.462512] ? udp_sendmsg+0xfb7/0x1da0 [ 462.466536] ip_route_output_flow+0x27/0xa0 [ 462.470886] udp_sendmsg+0x14a1/0x1da0 [ 462.474790] ? ip_reply_glue_bits+0xb0/0xb0 [ 462.479122] ? udp4_seq_show+0x520/0x520 [ 462.483293] ? save_trace+0x290/0x290 [ 462.487094] ? is_bpf_text_address+0x7f/0x120 [ 462.491601] udp_sendpage+0xfe/0x3e0 [ 462.495325] ? udp_destroy_sock+0x1a0/0x1a0 [ 462.499662] inet_sendpage+0x157/0x580 [ 462.503721] ? udp_destroy_sock+0x1a0/0x1a0 [ 462.508064] kernel_sendpage+0x92/0xf0 [ 462.511959] ? inet_sendmsg+0x500/0x500 [ 462.515944] sock_sendpage+0x8b/0xc0 [ 462.519658] ? kernel_sendpage+0xf0/0xf0 [ 462.523737] pipe_to_sendpage+0x242/0x340 [ 462.527883] ? direct_splice_actor+0x190/0x190 [ 462.532608] __splice_from_pipe+0x348/0x780 [ 462.536943] ? direct_splice_actor+0x190/0x190 [ 462.541565] ? direct_splice_actor+0x190/0x190 [ 462.546415] splice_from_pipe+0xf0/0x150 [ 462.550742] ? splice_shrink_spd+0xb0/0xb0 [ 462.554998] ? security_file_permission+0x89/0x1f0 [ 462.559934] generic_splice_sendpage+0x3c/0x50 [ 462.564606] ? splice_from_pipe+0x150/0x150 [ 462.569020] SyS_splice+0xd92/0x1430 [ 462.572748] ? __sb_end_write+0xc1/0x100 [ 462.576824] ? compat_SyS_vmsplice+0x250/0x250 [ 462.581406] ? do_syscall_64+0x53/0x640 [ 462.585380] ? compat_SyS_vmsplice+0x250/0x250 [ 462.589962] do_syscall_64+0x1e8/0x640 [ 462.593861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 462.598713] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 462.603902] RIP: 0033:0x459a59 [ 462.607105] RSP: 002b:00007f89a24c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 462.614818] RAX: ffffffffffffffda RBX: 00007f89a24c1c90 RCX: 0000000000459a59 [ 462.622086] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 462.629620] RBP: 000000000075c070 R08: 0000000000030005 R09: 0000000000000000 [ 462.636898] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f89a24c26d4 [ 462.644181] R13: 00000000004c94e7 R14: 00000000004dfe58 R15: 0000000000000008 08:33:40 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x1) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) [ 462.648753] kasan: CONFIG_KASAN_INLINE enabled [ 462.657655] CPU: 0 PID: 24178 Comm: syz-executor.4 Not tainted 4.14.148 #0 [ 462.664692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.674408] Call Trace: [ 462.677046] dump_stack+0x138/0x197 [ 462.680716] should_fail.cold+0x10f/0x159 [ 462.684905] should_failslab+0xdb/0x130 [ 462.688908] kmem_cache_alloc+0x47/0x780 [ 462.692998] ? __split_vma+0xc9/0x6d0 [ 462.696838] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 462.698855] FAULT_INJECTION: forcing a failure. [ 462.698855] name failslab, interval 1, probability 0, space 0, times 0 [ 462.702315] anon_vma_clone+0xde/0x470 [ 462.702331] __split_vma+0x28a/0x6d0 [ 462.702342] do_munmap+0xb09/0xd60 [ 462.702354] ? vmacache_update+0x101/0x130 [ 462.702367] mmap_region+0x16f/0x1030 [ 462.702385] do_mmap+0x5b8/0xcd0 [ 462.702401] vm_mmap_pgoff+0x17a/0x1d0 [ 462.702419] ? vma_is_stack_for_current+0xa0/0xa0 [ 462.702430] ? wait_for_completion+0x420/0x420 [ 462.702443] SyS_mmap_pgoff+0xa3/0x520 [ 462.702459] ? find_mergeable_anon_vma+0x2c0/0x2c0 [ 462.758200] ? do_syscall_64+0x53/0x640 [ 462.762165] ? align_vdso_addr+0x60/0x60 [ 462.766212] SyS_mmap+0x16/0x20 [ 462.769479] do_syscall_64+0x1e8/0x640 [ 462.773378] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 462.778220] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 462.783397] RIP: 0033:0x459a59 [ 462.786574] RSP: 002b:00007f834dc34c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 462.794276] RAX: ffffffffffffffda RBX: 00007f834dc34c90 RCX: 0000000000459a59 [ 462.801536] RDX: 0000000000000403 RSI: 0000000000fff000 RDI: 0000000020000000 [ 462.808808] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 462.816070] R10: 0002000000000032 R11: 0000000000000246 R12: 00007f834dc356d4 [ 462.823340] R13: 00000000004c6176 R14: 00000000004db118 R15: 0000000000000003 [ 462.831885] CPU: 1 PID: 24177 Comm: syz-executor.1 Not tainted 4.14.148 #0 [ 462.833133] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 462.839240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.839247] Call Trace: [ 462.839272] dump_stack+0x138/0x197 [ 462.839295] should_fail.cold+0x10f/0x159 [ 462.839310] should_failslab+0xdb/0x130 [ 462.839323] kmem_cache_alloc+0x2d7/0x780 [ 462.839347] mmap_region+0x602/0x1030 [ 462.858280] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 462.858659] do_mmap+0x5b8/0xcd0 [ 462.862262] Modules linked in: [ 462.866403] vm_mmap_pgoff+0x17a/0x1d0 [ 462.874481] ? vma_is_stack_for_current+0xa0/0xa0 [ 462.878255] CPU: 0 PID: 24151 Comm: syz-executor.0 Not tainted 4.14.148 #0 [ 462.884469] ? wait_for_completion+0x420/0x420 [ 462.887807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.890983] SyS_mmap_pgoff+0xa3/0x520 [ 462.894841] task: ffff888054a16300 task.stack: ffff888053530000 [ 462.899668] ? find_mergeable_anon_vma+0x2c0/0x2c0 [ 462.906659] RIP: 0010:cgroup_kill_sb+0x2e/0x330 [ 462.911224] ? do_syscall_64+0x53/0x640 [ 462.920549] RSP: 0018:ffff888053537ac0 EFLAGS: 00010246 [ 462.924422] ? align_vdso_addr+0x60/0x60 [ 462.935382] SyS_mmap+0x16/0x20 [ 462.940039] RAX: 0000000000000000 RBX: 00000000fffffff4 RCX: 0000000000000000 [ 462.944000] do_syscall_64+0x1e8/0x640 [ 462.949349] RDX: dffffc0000000000 RSI: ffffffff81a9c76c RDI: ffff88805fb2c930 [ 462.953392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 462.956648] RBP: ffff888053537ae0 R08: ffff888054a16300 R09: ffff888054a16ba0 [ 462.963907] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 462.967766] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88805fb2c900 [ 462.975022] RIP: 0033:0x459a59 [ 462.979852] R13: ffffffff877add80 R14: ffff88805fb2c900 R15: dffffc0000000000 [ 462.987117] RSP: 002b:00007f6aef8bbc78 EFLAGS: 00000246 [ 462.992403] FS: 00007fe5c907c700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 462.999651] ORIG_RAX: 0000000000000009 [ 463.002837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 463.010088] RAX: ffffffffffffffda RBX: 00007f6aef8bbc90 RCX: 0000000000459a59 [ 463.015432] CR2: 000000000075c000 CR3: 00000000a0ff4000 CR4: 00000000001426f0 [ 463.023640] RDX: 0000000000000403 RSI: 0000000000fff000 RDI: 0000000020000000 [ 463.027594] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 463.033465] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 463.040734] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 463.047988] R10: 0002000000000032 R11: 0000000000000246 R12: 00007f6aef8bc6d4 [ 463.055239] Call Trace: [ 463.062511] R13: 00000000004c6176 R14: 00000000004db118 R15: 0000000000000006 [ 463.069781] deactivate_locked_super+0x74/0xe0 [ 463.077347] protocol 88fb is buggy, dev hsr_slave_0 [ 463.084400] sget_userns+0x9d9/0xc30 [ 463.084410] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 463.084420] ? kernfs_sop_show_options+0x190/0x190 [ 463.087027] protocol 88fb is buggy, dev hsr_slave_1 [ 463.094249] kernfs_mount_ns+0xe9/0x790 [ 463.094261] cgroup_do_mount+0x9e/0x270 [ 463.094270] ? init_cgroup_root+0x310/0x310 [ 463.134396] ? parse_cgroup_root_flags+0x1/0x190 [ 463.139304] cgroup_mount+0x789/0x8b0 [ 463.143124] ? cgroup_attach_task+0x6c0/0x6c0 [ 463.147638] mount_fs+0x97/0x2a1 [ 463.151011] vfs_kern_mount.part.0+0x5e/0x3d0 [ 463.159436] do_mount+0x417/0x27d0 [ 463.162985] ? retint_kernel+0x2d/0x2d [ 463.166891] ? copy_mount_string+0x40/0x40 [ 463.171145] ? copy_mount_options+0x1f9/0x2f0 [ 463.175630] ? copy_mount_options+0x1fe/0x2f0 [ 463.180117] SyS_mount+0xab/0x120 [ 463.183570] ? copy_mnt_ns+0x8c0/0x8c0 [ 463.187444] do_syscall_64+0x1e8/0x640 [ 463.192014] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 463.196862] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 463.202037] RIP: 0033:0x459a59 [ 463.205211] RSP: 002b:00007fe5c907bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 463.213082] RAX: ffffffffffffffda RBX: 00007fe5c907bc90 RCX: 0000000000459a59 [ 463.220370] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 0000000000000000 [ 463.227628] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 463.234883] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5c907c6d4 [ 463.242140] R13: 00000000004c62c9 R14: 00000000004db250 R15: 0000000000000005 [ 463.249401] Code: e5 41 55 41 54 49 89 fc 53 48 83 ec 08 e8 7b 2a 06 00 4c 89 e7 e8 63 fc 52 00 48 ba 00 00 00 00 00 fc ff df 48 89 c1 48 c1 e9 03 <80> 3c 11 00 0f 85 c4 02 00 00 48 8b 18 48 b8 00 00 00 00 00 fc [ 463.268633] RIP: cgroup_kill_sb+0x2e/0x330 RSP: ffff888053537ac0 [ 463.275425] protocol 88fb is buggy, dev hsr_slave_0 [ 463.280934] protocol 88fb is buggy, dev hsr_slave_1 [ 463.286564] protocol 88fb is buggy, dev hsr_slave_0 [ 463.292167] protocol 88fb is buggy, dev hsr_slave_1 08:33:41 executing program 1 (fault-call:4 fault-nth:3): setrlimit(0x2, &(0x7f0000000080)={0x0, 0x2000000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) 08:33:41 executing program 4: set_robust_list(&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)}}, 0x18) setrlimit(0x2, &(0x7f0000000080)={0x0, 0x2000000}) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x3, 0x2, 0xb, 0x3, 0x9b, "6861ec96a0ea433e937e1b3dc8471305f08c22afa881e09f22f829b060ccd0883ae1307514c4dde9dcac63354fbf0e86df71261149862e661ca23d3c7d0043ec6c60344e14fc6e4b2f9dd9414be2a5f332be3cedeb3c03f695f8824972039af1c3f133b7af6f80e53cedcc905f6956f62475c6805f946643f6c1d81871c3eedcf970a886e6c8038418568938288d90e70a70333008cb0a6ce674d3"}, 0xa5, 0x2) munmap(&(0x7f00001db000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) [ 463.306200] kobject: 'loop1' (ffff8880a49beda0): kobject_uevent_env [ 463.315180] kobject: 'loop1' (ffff8880a49beda0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 463.331424] kobject: 'loop4' (ffff8880a4aba660): kobject_uevent_env [ 463.338628] kobject: 'loop4' (ffff8880a4aba660): fill_kobj_path: path = '/devices/virtual/block/loop4' 08:33:41 executing program 1: setrlimit(0x2, &(0x7f0000000080)={0x0, 0x1fffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x6, &(0x7f0000000000)={r4, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={r4, 0x3, 0x1000, 0xfff}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000001c0)={r5, 0x4}, &(0x7f0000000200)=0x8) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) readahead(r8, 0x5, 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2d, 0x201}, 0x14}}, 0x0) sendfile(r9, r1, &(0x7f0000000100), 0x49) pipe(&(0x7f0000000000)) 08:33:41 executing program 3 (fault-call:9 fault-nth:1): pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 463.404421] kobject: 'loop3' (ffff8880a4aa1720): kobject_uevent_env [ 463.415071] kobject: 'loop3' (ffff8880a4aa1720): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 463.428577] ---[ end trace 2d919d43efe3f5bf ]--- [ 463.442422] kobject: 'loop4' (ffff8880a4aba660): kobject_uevent_env [ 463.449032] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26222 sclass=netlink_route_socket pig=24192 comm=syz-executor.1 [ 463.449233] kobject: 'loop4' (ffff8880a4aba660): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 463.471885] Kernel panic - not syncing: Fatal exception [ 463.479086] Kernel Offset: disabled [ 463.482755] Rebooting in 86400 seconds..