[ 38.212030] audit: type=1800 audit(1572007898.172:32): pid=7411 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 39.072782] audit: type=1800 audit(1572007899.132:33): pid=7411 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.178' (ECDSA) to the list of known hosts. 2019/10/25 12:51:46 fuzzer started syzkaller login: [ 45.912722] kauditd_printk_skb: 2 callbacks suppressed [ 45.912736] audit: type=1400 audit(1572007905.972:36): avc: denied { map } for pid=7595 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/25 12:51:47 dialing manager at 10.128.0.105:41389 2019/10/25 12:51:47 syscalls: 2521 2019/10/25 12:51:47 code coverage: enabled 2019/10/25 12:51:47 comparison tracing: enabled 2019/10/25 12:51:47 extra coverage: extra coverage is not supported by the kernel 2019/10/25 12:51:47 setuid sandbox: enabled 2019/10/25 12:51:47 namespace sandbox: enabled 2019/10/25 12:51:47 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/25 12:51:47 fault injection: enabled 2019/10/25 12:51:47 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/25 12:51:47 net packet injection: enabled 2019/10/25 12:51:47 net device setup: enabled 2019/10/25 12:51:47 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 12:54:03 executing program 0: [ 183.887942] audit: type=1400 audit(1572008043.952:37): avc: denied { map } for pid=7613 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=83 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 184.006214] IPVS: ftp: loaded support on port[0] = 21 12:54:04 executing program 1: [ 184.119836] chnl_net:caif_netlink_parms(): no params data found [ 184.191595] IPVS: ftp: loaded support on port[0] = 21 [ 184.210086] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.217407] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.226242] device bridge_slave_0 entered promiscuous mode [ 184.245990] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.252604] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.260201] device bridge_slave_1 entered promiscuous mode [ 184.289179] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.300136] bond0: Enslaving bond_slave_1 as an active interface with an up link 12:54:04 executing program 2: [ 184.335221] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.344329] team0: Port device team_slave_0 added [ 184.350195] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 184.357959] team0: Port device team_slave_1 added [ 184.376134] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 184.420490] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 12:54:04 executing program 3: [ 184.505862] device hsr_slave_0 entered promiscuous mode [ 184.543253] device hsr_slave_1 entered promiscuous mode [ 184.590412] chnl_net:caif_netlink_parms(): no params data found [ 184.604956] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 184.613264] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 184.626739] IPVS: ftp: loaded support on port[0] = 21 [ 184.667123] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.673671] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.680660] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.687092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.719297] IPVS: ftp: loaded support on port[0] = 21 12:54:04 executing program 4: [ 184.795340] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.801827] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.812011] device bridge_slave_0 entered promiscuous mode [ 184.855675] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.862085] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.870123] device bridge_slave_1 entered promiscuous mode [ 184.974874] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 184.980986] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.012427] chnl_net:caif_netlink_parms(): no params data found [ 185.027178] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.042144] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 185.057668] IPVS: ftp: loaded support on port[0] = 21 [ 185.076312] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.115568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 12:54:05 executing program 5: [ 185.134982] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.153216] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.161256] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 185.175460] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 185.181544] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.227775] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.235721] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 185.247283] team0: Port device team_slave_0 added [ 185.253509] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 185.260891] team0: Port device team_slave_1 added [ 185.269823] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.277469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.285550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.293434] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.299768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.319767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.357959] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.374475] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.380869] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.388724] device bridge_slave_0 entered promiscuous mode [ 185.395859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.403883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.411477] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.417870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.442648] IPVS: ftp: loaded support on port[0] = 21 [ 185.448403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.455902] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.462260] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.469749] device bridge_slave_1 entered promiscuous mode [ 185.485921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.497015] chnl_net:caif_netlink_parms(): no params data found [ 185.545160] device hsr_slave_0 entered promiscuous mode [ 185.593213] device hsr_slave_1 entered promiscuous mode [ 185.643660] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 185.661219] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.680750] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 185.691284] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.699847] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.725106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.758044] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 185.766274] team0: Port device team_slave_0 added [ 185.773547] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 185.781480] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 185.789580] team0: Port device team_slave_1 added [ 185.795356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.822507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 185.839011] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.847723] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.869679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.877707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.885552] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.893522] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.901171] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.908019] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.915493] device bridge_slave_0 entered promiscuous mode [ 185.925071] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.931428] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.939677] device bridge_slave_1 entered promiscuous mode [ 185.964661] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.973566] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.984235] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 186.007414] chnl_net:caif_netlink_parms(): no params data found [ 186.016177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 186.027296] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 186.075729] device hsr_slave_0 entered promiscuous mode [ 186.113255] device hsr_slave_1 entered promiscuous mode [ 186.157152] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 186.166321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.174377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.181987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.189830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.198771] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 186.205565] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.224727] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.231944] team0: Port device team_slave_0 added [ 186.241219] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.249310] team0: Port device team_slave_1 added [ 186.254798] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 186.261805] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.269937] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 186.291355] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 186.385740] device hsr_slave_0 entered promiscuous mode [ 186.423491] device hsr_slave_1 entered promiscuous mode [ 186.483766] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 186.510816] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.517816] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 186.524622] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.531082] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.538695] device bridge_slave_0 entered promiscuous mode [ 186.546089] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.552498] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.560135] device bridge_slave_1 entered promiscuous mode [ 186.575321] chnl_net:caif_netlink_parms(): no params data found [ 186.588363] audit: type=1400 audit(1572008046.652:38): avc: denied { associate } for pid=7614 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 186.645128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.657760] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 186.668362] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 186.682125] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 186.691602] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 186.711015] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 12:54:06 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625f508300200000040"], 0x2d) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000100)=0x3, 0x4) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x1, 0x8080fffffffe) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000300)=""/132) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x0, 0x0) [ 186.768967] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.780738] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.788936] device bridge_slave_0 entered promiscuous mode [ 186.798783] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 186.812424] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.825453] team0: Port device team_slave_0 added [ 186.834937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.846141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.850709] audit: type=1400 audit(1572008046.912:39): avc: denied { create } for pid=7638 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 186.869721] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.877757] audit: type=1400 audit(1572008046.912:40): avc: denied { write } for pid=7638 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 186.889324] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.907666] audit: type=1400 audit(1572008046.912:41): avc: denied { read } for pid=7638 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 186.939662] device bridge_slave_1 entered promiscuous mode [ 186.949017] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 186.967912] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.983214] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.990561] team0: Port device team_slave_1 added [ 187.001678] hrtimer: interrupt took 45654 ns [ 187.017111] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 187.029862] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 187.039145] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.074764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.082519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.090449] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.096886] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.119164] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 187.129163] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.142280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.155688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.166852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.177559] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.184013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.245675] device hsr_slave_0 entered promiscuous mode [ 187.283404] device hsr_slave_1 entered promiscuous mode [ 187.325984] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 187.334153] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 187.358616] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 187.374348] team0: Port device team_slave_0 added [ 187.380929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 187.391825] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 187.409226] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.411564] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 187.427356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.434848] FAT-fs (loop0): Filesystem has been set read-only [ 187.435776] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 187.441431] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) [ 187.454377] team0: Port device team_slave_1 added [ 187.461945] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 187.472067] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 187.487959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.496928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.513995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 187.522426] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.540942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.556037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.572329] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.584053] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 187.591213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 187.607917] 8021q: adding VLAN 0 to HW filter on device bond0 12:54:07 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625f508300200000040"], 0x2d) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000100)=0x3, 0x4) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x1, 0x8080fffffffe) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000300)=""/132) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x0, 0x0) [ 187.628600] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 187.651871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.661582] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.683703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.690816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.699969] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 187.709914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 187.744961] device hsr_slave_0 entered promiscuous mode [ 187.773512] device hsr_slave_1 entered promiscuous mode [ 187.803628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.819125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.826991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.841435] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.852108] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 187.864314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.874374] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 187.880456] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.895002] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.901482] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 187.921729] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 187.937709] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 187.954988] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 187.973768] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 187.981757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.996583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.007749] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.014365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.026970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.035154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.046575] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.061019] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 188.092223] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 188.100471] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.121053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.126394] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 188.134412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.136310] FAT-fs (loop0): Filesystem has been set read-only [ 188.147971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.150142] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 188.158510] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.171318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.196064] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 12:54:08 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 12:54:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000180)=@newlink={0x50, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_IKEY={0x8, 0x4, 0x3}, @IFLA_GRE_TTL={0x8}]]}}}, @IFLA_BROADCAST={0xc, 0x3}]}, 0x50}}, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) [ 188.219350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 188.238683] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.246842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.260351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.270215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.284505] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.291029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.300793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.312491] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.325297] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 188.344572] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 12:54:08 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet6_dccp_buf(r0, 0x21, 0x5ba5173fb603414b, &(0x7f00000012c0)="c21facd555071527d623e8e36254e175e7540116a2b3d925f8b1ae670b5254d4d21b7d9f89052d86ac2c4b59a5bd76681e8a4f6ec6a382fcb19895de17c10904d23be31ae3581c3e2d8c5a3a128d15386839086d829a0181430fc649b36da9a66f5f4cc1e0f55c1da1c70abf19ec89eaf867f672768582372666fbadcabfbf08403eea1108e1ed69c7440d6a3a5ff886766c2b2eef062f2d3fff633507ef046f9212101b1f81625da4bf44e5479f06365a2150205bb272b13a57ee9eddfeee0e654f", 0xc2) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000011c0)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x82}, 0xc, &(0x7f0000001180)={&(0x7f0000001200)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000127bd7000fddbdf2506000000100001006e657464657673696d000100100002006e657464657673696d30000008000300030000000800040001000000100001006e657464657673696d000000100002006e657464653673696d30000008000300010000000800040000000000749ab373082cf98182a558630a69ad3483248db6e9e739667c6b5d26ca9b794858a6455f9db4ced7eca265a1ba07af3da969e7ec79b20f0c1e554de80da5bf7a76e213d5e6e3bdc5c564bc94"], 0x74}, 0x1, 0x0, 0x0, 0xfe75e96b52dbd261}, 0x40020) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045006, &(0x7f0000000000)=0x7b) read$FUSE(r1, &(0x7f00000000c0), 0x1000) [ 188.370681] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.384782] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 188.392595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.412023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.433782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.441606] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.448191] bridge0: port 2(bridge_slave_1) entered forwarding state 12:54:08 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 188.474259] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 188.488579] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.512039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.531460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.553841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.560848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.574437] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 12:54:08 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet6_dccp_buf(r0, 0x21, 0x5ba5173fb603414b, &(0x7f00000012c0)="c21facd555071527d623e8e36254e175e7540116a2b3d925f8b1ae670b5254d4d21b7d9f89052d86ac2c4b59a5bd76681e8a4f6ec6a382fcb19895de17c10904d23be31ae3581c3e2d8c5a3a128d15386839086d829a0181430fc649b36da9a66f5f4cc1e0f55c1da1c70abf19ec89eaf867f672768582372666fbadcabfbf08403eea1108e1ed69c7440d6a3a5ff886766c2b2eef062f2d3fff633507ef046f9212101b1f81625da4bf44e5479f06365a2150205bb272b13a57ee9eddfeee0e654f", 0xc2) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000011c0)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x82}, 0xc, &(0x7f0000001180)={&(0x7f0000001200)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000127bd7000fddbdf2506000000100001006e657464657673696d000100100002006e657464657673696d30000008000300030000000800040001000000100001006e657464657673696d000000100002006e657464653673696d30000008000300010000000800040000000000749ab373082cf98182a558630a69ad3483248db6e9e739667c6b5d26ca9b794858a6455f9db4ced7eca265a1ba07af3da969e7ec79b20f0c1e554de80da5bf7a76e213d5e6e3bdc5c564bc94"], 0x74}, 0x1, 0x0, 0x0, 0xfe75e96b52dbd261}, 0x40020) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045006, &(0x7f0000000000)=0x7b) read$FUSE(r1, &(0x7f00000000c0), 0x1000) [ 188.581306] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.588927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.601787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 188.611051] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 188.618216] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.652820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.663593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.679548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.691181] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 12:54:08 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet6_dccp_buf(r0, 0x21, 0x5ba5173fb603414b, &(0x7f00000012c0)="c21facd555071527d623e8e36254e175e7540116a2b3d925f8b1ae670b5254d4d21b7d9f89052d86ac2c4b59a5bd76681e8a4f6ec6a382fcb19895de17c10904d23be31ae3581c3e2d8c5a3a128d15386839086d829a0181430fc649b36da9a66f5f4cc1e0f55c1da1c70abf19ec89eaf867f672768582372666fbadcabfbf08403eea1108e1ed69c7440d6a3a5ff886766c2b2eef062f2d3fff633507ef046f9212101b1f81625da4bf44e5479f06365a2150205bb272b13a57ee9eddfeee0e654f", 0xc2) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000011c0)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x82}, 0xc, &(0x7f0000001180)={&(0x7f0000001200)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000127bd7000fddbdf2506000000100001006e657464657673696d000100100002006e657464657673696d30000008000300030000000800040001000000100001006e657464657673696d000000100002006e657464653673696d30000008000300010000000800040000000000749ab373082cf98182a558630a69ad3483248db6e9e739667c6b5d26ca9b794858a6455f9db4ced7eca265a1ba07af3da969e7ec79b20f0c1e554de80da5bf7a76e213d5e6e3bdc5c564bc94"], 0x74}, 0x1, 0x0, 0x0, 0xfe75e96b52dbd261}, 0x40020) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045006, &(0x7f0000000000)=0x7b) read$FUSE(r1, &(0x7f00000000c0), 0x1000) [ 188.702431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 188.714700] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 188.723938] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.730476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.741935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.749706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.757971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.766933] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.773375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.780440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.790885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 188.801640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 188.819344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 188.836851] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.844785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.853457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.862257] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.871874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.892493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.906464] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.912900] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.921390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.930981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.940051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.947738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.961150] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 188.968711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.980055] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 188.991023] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 188.997626] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.004198] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.012159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.020277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.029476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 189.042634] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 189.053469] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.060717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.069535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.077792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.085712] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.092050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.099356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.110494] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 189.120544] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 189.130215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.140394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.148243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.156763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.164579] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.170917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.179183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 189.191498] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.200018] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 189.207609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.217158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.228414] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 189.245448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 189.254433] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 189.265325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 189.272575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.281060] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.289370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.297844] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.305976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.313814] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.321315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.330085] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.340115] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 189.358496] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready 12:54:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x101) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000080)={0xa, 0x9, 0x8, 0x6}, 0xa) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f00000000c0)={0x7, "9117e9be7f9f7acd40c4526eea151d61a7c3107bed96c5c207d314b0cd915da0", 0x2, 0x7ff, 0x2, 0x2, 0x2b71a79ed9639136}) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x1) [ 189.373865] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 189.381971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.398181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.406867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.426171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.435339] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.445919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 189.459976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 189.479590] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 189.487370] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.495701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.504156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.511689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.520514] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.530596] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 189.542542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.552177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 189.566724] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.577288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.585259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.596236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 189.613376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.621036] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.637763] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 189.649134] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 189.655429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.671067] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 189.686542] 8021q: adding VLAN 0 to HW filter on device batadv0 12:54:09 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x6c0, 0xf8ef, 0x3, 0x6, 0x1, 0x505, 0x10001, 0x80000001, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e21, 0x81, @ipv4={[], [], @remote}}}, 0x1, 0x9, 0x5, 0x200, 0x16}, &(0x7f0000000100)=0x98) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000040)=0x9, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000), 0x4) r3 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x7, 0x480) sendto$inet(r3, &(0x7f00000002c0)="71c8740b1a3944dbf0037dbf777e5d44ca27323328d943f5ffd301e24bdd6273c644c54620bb6493201b406d56fda4adb7e173f2af3d0a38d3877d58849f3fe56948cd4a833d51277b3efb6a3047f4c5c9edd332cec5d5b45f9489e2e53c91316f13c54c37fb8bc52ad3ff04b1b8d0dfd8bf8351ce9a04d1c6a7c47f5ca88ddb00747baff3b36ca1a8735ec991189c9c32e843ef68e0f2b31184d44525547f38a63eefdda28d74b429a53151412c2ddde50520", 0xb3, 0x50, &(0x7f0000000380)={0x2, 0x4e23, @rand_addr=0x8000}, 0x10) [ 189.713836] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.789308] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:54:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000700)='./file0\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000280)={0x7, 0x1b, 0x2}, 0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x05\x06\x06\x00\x00\x00\x00\x00\x00D3A}\xe4\xac\xff\x82q\xc7J\xe2J\x06\x00\x00\x00\x00\xd9\xbc\x0e\x9a\xd5\t\f\xe2\x90G903\xd7\x8d\xa8\x9e@?\xe5\xb1\rQ-\v\xcb\xbf\xd6=\bWN\x824\x06\xe9fL\x9b>\xdd\a\xba8\x1a{\x93\xbb\x02*5F\x8d*\xbb\xd9|\x03\x86&Ds\xd1`=\x04\'\xf7\xd7\xb3\xae3\x81\xdd\xf57\xd9Y=\xb6/\xe2g\xc7\xcd\x1d\xb3T9\xda\xc3\x80\xd4\x13\x9f\xbf\xc0\x82\xe2\xc7\xc8\x18w\xc163B\xdcW\xff\xaf\x00\x00\x00\x00J\x00*\x14\b\xeb\xc4\x8d\xb7\x81h/\x9d\xcf\x8cJ\xec\b\xdd&\xc7`\x86\xe5\xaf\xdeC\xcd\x9e\x01\xd4\x9b\x9b)\xf9=\xed\x15!+\xc4>V\x19!V\xaajPP\x00\xfa$Q\x82\x007Qu.\x9bm\xf9\x8ctEI\x94\xbf\xd9\xe4l\x1a&\x1ae\x02p\xd6J\xe5},V\xe9]\x96\xbc\r\x8a\xa5G\x84*\xdd\x14\xdc\xef\xc9\xber\xac;\xd2]\xd8\x9f\x96\xc5\x00\x00~\xb4\xd8LS\x8e\x84\x88\a\x92\xe1\xac\xf7\xd5\xe8\x84h\xf4v\x86\xe7+\xba\xe3F\x02 gEo\xf5M\x1c\xc9\xb3@\xd0}S\v\"G\xf8\x9f\x82(iuW{+\xef\x9cD\x9d9\xf6\xdf/.\xcep;\x04 \xe3r\x91\xbc\x17)\x1f') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000580)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x05\x06\x06\x00\x00\x00\x00\x00\x00D3A}\xe4\xac\xff\x82q\xc7J\xe2J\x06\x00\x00\x00\x00\xd9\xbc\x0e\x9a\xd5\t\f\xe2\x90G903\xd7\x8d\xa8\x9e@?\xe5\xb1\rQ-\v\xcb\xbf\xd6=\bWN\x824\x06\xe9fL\x9b>\xdd\a\xba8\x1a{\x93\xbb\x02*5F\x8d*\xbb\xd9|\x03\x86&Ds\xd1`=\x04\'\xf7\xd7\xb3\xae3\x81\xdd\xf57\xd9Y=\xb6/\xe2g\xc7\xcd\x1d\xb3T9\xda\xc3\x80\xd4\x13\x9f\xbf\xc0\x82\xe2\xc7\xc8\x18w\xc163B\xdcW\xff\xaf\x00\x00\x00\x00J\x00*\x14\b\xeb\xc4\x8d\xb7\x81h/\x9d\xcf\x8cJ\xec\b\xdd&\xc7`\x86\xe5\xaf\xdeC\xcd\x9e\x01\xd4\x9b\x9b)\xf9=\xed\x15!+\xc4>V\x19!V\xaajPP\x00\xfa$Q\x82\x007Qu.\x9bm\xf9\x8ctEI\x94\xbf\xd9\xe4l\x1a&\x1ae\x02p\xd6J\xe5},V\xe9]\x96\xbc\r\x8a\xa5G\x84*\xdd\x14\xdc\xef\xc9\xber\xac;\xd2]\xd8\x9f\x96\xc5\x00\x00~\xb4\xd8LS\x8e\x84\x88\a\x92\xe1\xac\xf7\xd5\xe8\x84h\xf4v\x86\xe7+\xba\xe3F\x02 gEo\xf5M\x1c\xc9\xb3@\xd0}S\v\"G\xf8\x9f\x82(iuW{+\xef\x9cD\x9d9\xf6\xdf/.\xcep;\x04 \xe3r\x91\xbc\x17)\x1f') accept4$unix(r0, 0x0, &(0x7f0000000080), 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) 12:54:09 executing program 5: r0 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x323) write$FUSE_POLL(r0, &(0x7f0000000540)={0x18}, 0x18) r1 = socket(0x10, 0x80002, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x161042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) write(r1, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000b4bffc)=0x7, 0x4) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$KDSETLED(r3, 0x4b32, 0x2) recvmmsg(r1, &(0x7f0000000780), 0x2bb1f36c7597d46, 0x2, 0x0) 12:54:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = geteuid() syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r2, @ANYBLOB=',session=0x0000240000000']) 12:54:09 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000e93000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYRES64], 0x0, 0xaf, 0xfffffeb9}, 0xfffffd9f) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpgid(0x0) ptrace$cont(0xffffffffffffffff, r4, 0x1, 0x335) getpgid(r4) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x101200, 0x0) setsockopt$inet_opts(r5, 0x0, 0xa, &(0x7f0000000340)="067fa9052f13ff6da3dff3cb58a63cfde65b264dbc545a5dce0db977df59147e91a3536e4d074ffb73c2104263e9bf7237fbb96e4452e5901adf52da13dadbf4085254cfbbec6b37816ef7117c25312cbaa9e38d2d758918fe5c1b953fdd1bd1d701cb5e4c4b65e86fafb8bad7bcea4240e287959102fb4f838885d9d69a7ad17343af680d3df4368632d027418878185624237dc542b43dd502a4cc4cc7d8ff8623b1b30b73ba58", 0xa8) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 12:54:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x101) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000080)={0xa, 0x9, 0x8, 0x6}, 0xa) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f00000000c0)={0x7, "9117e9be7f9f7acd40c4526eea151d61a7c3107bed96c5c207d314b0cd915da0", 0x2, 0x7ff, 0x2, 0x2, 0x2b71a79ed9639136}) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x1) [ 189.937558] hfs: can't find a HFS filesystem on dev loop1 [ 189.955322] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 190.039414] hfs: can't find a HFS filesystem on dev loop1 12:54:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="8b39", 0x2) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x7, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x12, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='\x00\x00\x7f\xef\x00\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) bind$inet(0xffffffffffffffff, 0x0, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=""/248, 0xf8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000802, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) r2 = dup(0xffffffffffffffff) dup(0xffffffffffffffff) sendmmsg$inet(r2, 0x0, 0x0, 0x0) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) write(r3, &(0x7f0000000380), 0xfffffffe) 12:54:10 executing program 1: gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000059, 0x220, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0xfffffffe, @ipv4={[], [], @loopback}}, 0x1c) sendto$inet6(r4, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) 12:54:10 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x2009, 0x1}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x0, 0x6000000}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b54c13c1b7e87b0071") r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_virtio(&(0x7f0000000180)='keyring,em0vboxnet1wlan1*wlan0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x5d8f93903761eb65, &(0x7f0000000380)={'trans=virtio,', {[{@noextend='noextend'}, {@mmap='mmap'}]}}) connect$x25(0xffffffffffffffff, &(0x7f0000000000)={0x9, @remote={[], 0x2}}, 0x12) ioctl$SIOCAX25DELFWD(r0, 0x89e7, 0x0) 12:54:10 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000002c0)=0x1, 0x1a5) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000200)="a0af04d2e5920ec3f9ae3a316db8ebcd9b755a0feaee9a3069a7b9713c17b75998c1c6e34a5d919dd7285263a07d2f768dcc587d94a5ebb780ddd59c2ce43420596965159b2132bdb9b70254b1f0279762adea5011be99aa0123baf2a2067de2f7a9d380f25e1bfe9e4f3ad9d1cf42e03c72b8", 0x73) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 190.372021] audit: type=1400 audit(1572008050.432:42): avc: denied { map } for pid=7716 comm="syz-executor.5" path="/selinux/policy" dev="selinuxfs" ino=20 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 12:54:10 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xffffffffffffff8b}}, 0x0) shmdt(0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x11996fa2b469d35, 0x0) 12:54:10 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x24, &(0x7f0000000140)) 12:54:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000700)='./file0\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000280)={0x7, 0x1b, 0x2}, 0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x05\x06\x06\x00\x00\x00\x00\x00\x00D3A}\xe4\xac\xff\x82q\xc7J\xe2J\x06\x00\x00\x00\x00\xd9\xbc\x0e\x9a\xd5\t\f\xe2\x90G903\xd7\x8d\xa8\x9e@?\xe5\xb1\rQ-\v\xcb\xbf\xd6=\bWN\x824\x06\xe9fL\x9b>\xdd\a\xba8\x1a{\x93\xbb\x02*5F\x8d*\xbb\xd9|\x03\x86&Ds\xd1`=\x04\'\xf7\xd7\xb3\xae3\x81\xdd\xf57\xd9Y=\xb6/\xe2g\xc7\xcd\x1d\xb3T9\xda\xc3\x80\xd4\x13\x9f\xbf\xc0\x82\xe2\xc7\xc8\x18w\xc163B\xdcW\xff\xaf\x00\x00\x00\x00J\x00*\x14\b\xeb\xc4\x8d\xb7\x81h/\x9d\xcf\x8cJ\xec\b\xdd&\xc7`\x86\xe5\xaf\xdeC\xcd\x9e\x01\xd4\x9b\x9b)\xf9=\xed\x15!+\xc4>V\x19!V\xaajPP\x00\xfa$Q\x82\x007Qu.\x9bm\xf9\x8ctEI\x94\xbf\xd9\xe4l\x1a&\x1ae\x02p\xd6J\xe5},V\xe9]\x96\xbc\r\x8a\xa5G\x84*\xdd\x14\xdc\xef\xc9\xber\xac;\xd2]\xd8\x9f\x96\xc5\x00\x00~\xb4\xd8LS\x8e\x84\x88\a\x92\xe1\xac\xf7\xd5\xe8\x84h\xf4v\x86\xe7+\xba\xe3F\x02 gEo\xf5M\x1c\xc9\xb3@\xd0}S\v\"G\xf8\x9f\x82(iuW{+\xef\x9cD\x9d9\xf6\xdf/.\xcep;\x04 \xe3r\x91\xbc\x17)\x1f') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000580)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x05\x06\x06\x00\x00\x00\x00\x00\x00D3A}\xe4\xac\xff\x82q\xc7J\xe2J\x06\x00\x00\x00\x00\xd9\xbc\x0e\x9a\xd5\t\f\xe2\x90G903\xd7\x8d\xa8\x9e@?\xe5\xb1\rQ-\v\xcb\xbf\xd6=\bWN\x824\x06\xe9fL\x9b>\xdd\a\xba8\x1a{\x93\xbb\x02*5F\x8d*\xbb\xd9|\x03\x86&Ds\xd1`=\x04\'\xf7\xd7\xb3\xae3\x81\xdd\xf57\xd9Y=\xb6/\xe2g\xc7\xcd\x1d\xb3T9\xda\xc3\x80\xd4\x13\x9f\xbf\xc0\x82\xe2\xc7\xc8\x18w\xc163B\xdcW\xff\xaf\x00\x00\x00\x00J\x00*\x14\b\xeb\xc4\x8d\xb7\x81h/\x9d\xcf\x8cJ\xec\b\xdd&\xc7`\x86\xe5\xaf\xdeC\xcd\x9e\x01\xd4\x9b\x9b)\xf9=\xed\x15!+\xc4>V\x19!V\xaajPP\x00\xfa$Q\x82\x007Qu.\x9bm\xf9\x8ctEI\x94\xbf\xd9\xe4l\x1a&\x1ae\x02p\xd6J\xe5},V\xe9]\x96\xbc\r\x8a\xa5G\x84*\xdd\x14\xdc\xef\xc9\xber\xac;\xd2]\xd8\x9f\x96\xc5\x00\x00~\xb4\xd8LS\x8e\x84\x88\a\x92\xe1\xac\xf7\xd5\xe8\x84h\xf4v\x86\xe7+\xba\xe3F\x02 gEo\xf5M\x1c\xc9\xb3@\xd0}S\v\"G\xf8\x9f\x82(iuW{+\xef\x9cD\x9d9\xf6\xdf/.\xcep;\x04 \xe3r\x91\xbc\x17)\x1f') accept4$unix(r0, 0x0, &(0x7f0000000080), 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) 12:54:11 executing program 5: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x0) read(r0, &(0x7f00000001c0)=""/11, 0x349) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') dup3(r1, r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000400)={@dev, @broadcast, 0x0}, &(0x7f0000000440)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000580)=0x377) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@multicast2, @in=@local, 0x4e22, 0x1, 0x4e23, 0x2, 0x5, 0x40, 0x0, 0xc, r3, r4}, {0x1, 0x81, 0x4, 0x7, 0x5, 0x40000000, 0x6, 0x9}, {0x9, 0x1, 0x2, 0xca37}, 0x5, 0x6e6bb4, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d5, 0xf}, 0x2, @in=@multicast1, 0x3507, 0x2, 0x2, 0x0, 0x1, 0x69fa, 0x1}}, 0xe8) tkill(0x0, 0x1000000000013) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffffffffff4e, 0x80080) ioctl$USBDEVFS_CONNECTINFO(r5, 0x40085511, &(0x7f0000000080)) 12:54:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x40) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0xa}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={r4, @multicast2, @multicast1}, 0xc) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, 0x0, 0x0) sendmsg$inet6(r5, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e22, 0x80000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]}, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'security\x00', 0xa2, "2c7c95b54b3c0edd1a475737bc282377b28f313a7c91490abdfa8c2ea698b753178fc9cb26d9e27baf00abfe84f638dc8bc5f279f484b4da9447d358783abb8fdb5aa04b9690e1dae7b3cddfcf6eec8bc537640cdf10c769cc8b4554dabeab74988cf34ac2c0c93e672c48b8fd4d24fac87fdc1271915e525fa6e683f8dfe6036b05962032c506ec0ac58e1e9092aeb5efdf7028133689ddba6d8bc0e459e1621847"}, &(0x7f00000002c0)=0xc6) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000500)=0x5, 0x4) sendto$inet(r7, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:54:11 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7ffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4, 0x8, 0x3ff, 0x0, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x20) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x111580, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000140)=0xfff) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4000) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) [ 191.185989] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 191.205070] audit: type=1400 audit(1572008051.272:43): avc: denied { map_create } for pid=7756 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 12:54:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$netrom(r1, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:11 executing program 1: gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000059, 0x220, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0xfffffffe, @ipv4={[], [], @loopback}}, 0x1c) sendto$inet6(r4, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) [ 191.332044] audit: type=1400 audit(1572008051.312:44): avc: denied { map_read map_write } for pid=7756 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 12:54:11 executing program 2: gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000059, 0x220, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2, 0xfffffffe, @ipv4={[], [], @loopback}}, 0x1c) sendto$inet6(r4, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) [ 191.484421] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:11 executing program 5: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x0) read(r0, &(0x7f00000001c0)=""/11, 0x349) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') dup3(r1, r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000400)={@dev, @broadcast, 0x0}, &(0x7f0000000440)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000580)=0x377) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@multicast2, @in=@local, 0x4e22, 0x1, 0x4e23, 0x2, 0x5, 0x40, 0x0, 0xc, r3, r4}, {0x1, 0x81, 0x4, 0x7, 0x5, 0x40000000, 0x6, 0x9}, {0x9, 0x1, 0x2, 0xca37}, 0x5, 0x6e6bb4, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d5, 0xf}, 0x2, @in=@multicast1, 0x3507, 0x2, 0x2, 0x0, 0x1, 0x69fa, 0x1}}, 0xe8) tkill(0x0, 0x1000000000013) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffffffffff4e, 0x80080) ioctl$USBDEVFS_CONNECTINFO(r5, 0x40085511, &(0x7f0000000080)) 12:54:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x40) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0xa}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={r4, @multicast2, @multicast1}, 0xc) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, 0x0, 0x0) sendmsg$inet6(r5, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e22, 0x80000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="2a8f452ce873e05a5e6b6eded1187a43d574243dc95700f21b0c95d6078210e8779f0bce5234b9862411a4849f7f9529c6b0deda7e5a23df614bec9ef677b637acdfa1f250894039b6919f5d4321db4c990a2266479b42381641d4761fe4c285ee44b57db72f8c491fb44e58d95c3e6fafc2fcbd247ec029ac2fd85b8c9b420458661d303233d78530dfbb6ba505497223de24ac2562ada4e29f5afe35ebd780c3f37343cfe53a8625d0abf93de9f2e9e0bcb951c92b05f1f2d9b17bb2bf1b70e4e94d695c0717d93fcc385ee6f2f40d21b40713655abad96b10d3fb83df692b92678fd48a813d61560e416564de0e0005e5dbc6293f1243019133491853e538e33f8434aaf4b9947fd3cffee33013a655e042ae27f2d3ef43c2e9ca95f736eab5830e0a7a551e3ff3b0b582ddc2d7"]}, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'security\x00', 0xa2, "2c7c95b54b3c0edd1a475737bc282377b28f313a7c91490abdfa8c2ea698b753178fc9cb26d9e27baf00abfe84f638dc8bc5f279f484b4da9447d358783abb8fdb5aa04b9690e1dae7b3cddfcf6eec8bc537640cdf10c769cc8b4554dabeab74988cf34ac2c0c93e672c48b8fd4d24fac87fdc1271915e525fa6e683f8dfe6036b05962032c506ec0ac58e1e9092aeb5efdf7028133689ddba6d8bc0e459e1621847"}, &(0x7f00000002c0)=0xc6) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000500)=0x5, 0x4) sendto$inet(r7, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:54:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$netrom(r1, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:12 executing program 4: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000140)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20002000005) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfffffc8f) tee(r5, r4, 0x100000000, 0x0) read(r3, &(0x7f0000000000)=""/184, 0xbfcc8116) tee(r3, r6, 0x80, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000380)=0xc) syz_mount_image$erofs(&(0x7f0000000180)='erofs\x00', &(0x7f0000000200)='./file0\x00', 0x2, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000240)="b61f2d71cdaf6819f8dac8fc9a6cf71bb86417e0e2d487e7409579da59163cecc7aa2b9097ecc2cbd7293f", 0x2b, 0x80000000}], 0x10009a, &(0x7f00000003c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x8}}], [{@smackfsdef={'smackfsdef'}}, {@euid_eq={'euid', 0x3d, r8}}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, 't\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05'}}, {@subj_user={'subj_user', 0x3d, '/proc/self/net/pfkey\x00'}}, {@uid_eq={'uid', 0x3d, r9}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio='permit_directio'}]}) 12:54:12 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = getpgid(0x0) ptrace$cont(0xffffffffffffffff, r1, 0x1, 0x335) ptrace$setregs(0xf, r1, 0x8, &(0x7f0000000280)="a832345cb2fa9fa8b8d407f0f6190da57c3962b0b9ece09893817a04c8cc5e4ee426cd3483cb77d7a14e53e2399dab0512db0b88e0f8c2f2da63558d024b86bfb1e9796ef0c9f19fc6123cb012b637f8aa5f5efc29b1688804da43f8389fd37f79eb089097ad07b692625554dbf19e4fd3c3d68b84c735d471066e867cc2001a8516c327990309904281ca3a1a3ce626ac76e57780d179fd6f252d332f26051ea6c62d49a9812437031f79606f12b2579fdcd5995424739b55f108") setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000100)={0x0, 0x954}, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="020f0000140000000000000000000000080012000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000101000500000000000a0000000000000000000000000000000000ffff7f000001000000000000000005000000000000000a00000000000000fe8000000007000000000000000000ff00000000000000008478a0d7779d5c792c5e13f916be32893d1e289602292686b5868f099c286302b6070d4b14802e06058a9ca114b9b732ba265d32fdb830d60be91f4ee3512dbde6775ff5b38d733836f2c2d9aff64392326f48c449f2b5263946f0"], 0xa0}}, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000340)=""/155) 12:54:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x40) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0xa}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={r4, @multicast2, @multicast1}, 0xc) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, 0x0, 0x0) sendmsg$inet6(r5, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e22, 0x80000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]}, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'security\x00', 0xa2, "2c7c95b54b3c0edd1a475737bc282377b28f313a7c91490abdfa8c2ea698b753178fc9cb26d9e27baf00abfe84f638dc8bc5f279f484b4da9447d358783abb8fdb5aa04b9690e1dae7b3cddfcf6eec8bc537640cdf10c769cc8b4554dabeab74988cf34ac2c0c93e672c48b8fd4d24fac87fdc1271915e525fa6e683f8dfe6036b05962032c506ec0ac58e1e9092aeb5efdf7028133689ddba6d8bc0e459e1621847"}, &(0x7f00000002c0)=0xc6) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000500)=0x5, 0x4) sendto$inet(r7, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 192.448790] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 192.460139] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 192.489476] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 12:54:12 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000002c0)=0x1, 0x1a5) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180)="8907040400", 0x5) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) futimesat(r3, &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)={{r4, r5/1000+10000}, {0x0, 0x7530}}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x8, 0x602241) r6 = fcntl$dupfd(r2, 0x0, r0) write$P9_RLINK(r6, &(0x7f0000000280)={0x7, 0x47, 0x2}, 0x7) lseek(r1, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) r9 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_TIOCINQ(r9, 0x541b, &(0x7f0000000300)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000004c0)={@loopback, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet6_mreq(r10, 0x29, 0x2a, &(0x7f0000000540)={@local, r11}, 0x14) 12:54:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$netrom(r1, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:13 executing program 4: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000140)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20002000005) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfffffc8f) tee(r5, r4, 0x100000000, 0x0) read(r3, &(0x7f0000000000)=""/184, 0xbfcc8116) tee(r3, r6, 0x80, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000380)=0xc) syz_mount_image$erofs(&(0x7f0000000180)='erofs\x00', &(0x7f0000000200)='./file0\x00', 0x2, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000240)="b61f2d71cdaf6819f8dac8fc9a6cf71bb86417e0e2d487e7409579da59163cecc7aa2b9097ecc2cbd7293f", 0x2b, 0x80000000}], 0x10009a, &(0x7f00000003c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x8}}], [{@smackfsdef={'smackfsdef'}}, {@euid_eq={'euid', 0x3d, r8}}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, 't\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05'}}, {@subj_user={'subj_user', 0x3d, '/proc/self/net/pfkey\x00'}}, {@uid_eq={'uid', 0x3d, r9}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio='permit_directio'}]}) 12:54:13 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0xf) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000002c0)=""/140) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f00000000c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000180)=""/78) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r4, 0x40045569, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xc) setresuid(0x0, r5, 0xee01) open(&(0x7f0000000000)='./file0\x00', 0x585144, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r7, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r8, 0x805, 0x0, 0x0, {{0x1, 0x68}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800042}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x34, r8, 0x0, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xf, 0x2, @l2={'eth', 0x3a, 'hwsim0\x00'}}}}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x240080d4}, 0x4000004) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$notify(r6, 0x402, 0x20) 12:54:13 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000001980)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) vmsplice(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000200)}, {&(0x7f0000001200)=')', 0x1}], 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[]}, 0x78) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000200)) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = getpgrp(0x0) waitid(0x0, r2, &(0x7f00000002c0), 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8120cf7a41e53bcf}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000001800)=0x3c71) close(r1) socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000001840)=0x8, 0x4) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = accept(0xffffffffffffffff, &(0x7f0000001880)=@generic, &(0x7f00000001c0)=0x80) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000001900)=0x4, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:54:13 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$P9_RVERSION(r2, &(0x7f00000000c0)={0x15, 0x65, 0xffff, 0x12f, 0x8, '9P2000.L'}, 0x15) r3 = syz_open_dev$admmidi(&(0x7f0000000340)='/dev/admmidi#\x00', 0x0, 0x2) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x20240, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x4, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@aname={'aname', 0x3d, '!),{#@em1em1ppp0(selinux\xef'}}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x5}}], [{@context={'context', 0x3d, 'root'}}, {@obj_user={'obj_user', 0x3d, '9p\x00'}}, {@euid_eq={'euid'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x2bf, 0x1}}, 0x20) [ 193.345817] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:13 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xfe201c65bf86e624, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) write$uinput_user_dev(r3, &(0x7f0000000140)={'\x04yz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\t\x00\x00\xfe\xff\xff\xff\x00\x00\x00\x00\x05\xbf\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000], [0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0xffffffff]}, 0x45c) [ 193.499091] 9pnet: Insufficient options for proto=fd 12:54:13 executing program 5: ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000200)) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) semget(0x0, 0x0, 0x102) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000340)={0x0, 0x1, @raw_data=[0x7fff, 0x3, 0xff, 0x2, 0xffff, 0xa6, 0x0, 0x0, 0x5, 0x7, 0xefba, 0x6, 0x1, 0x87, 0x80, 0x4]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000002c0)=0x80) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000480)) r3 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000440)={0x3, 0x6, 0x5000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000580)=0x44) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x10001}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f0000000200)={r4}) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="e303eb21a92bd05bd543987132b0a300fbe699376eebad8ad454c45a14ed58ac7ed709e87e6c175e2457c1781b3f6e71e45af2912e8f1e387c08994e11310c230ad7401911774d2e"], 0x15, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x160) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) sendmsg(r0, &(0x7f0000000080)={0x0, 0x24a, &(0x7f00000001c0), 0x3b4, 0x0, 0xe0}, 0x0) 12:54:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) close(r3) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r4, 0x200006) sendfile(r3, r4, 0x0, 0x8000fffffffe) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000040)={r8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={r8, 0xcc, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000}, @in6={0xa, 0x4e20, 0x9, @mcast2, 0x79}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e22, 0x6, @local, 0x1}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e22, 0xaa6f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7ff}, @in6={0xa, 0x4e22, 0x0, @local, 0x7}]}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f00000002c0)={r9, 0xa7, "113d850800556fa9c02ba08952b0f5ae038345bd299ebfde9215aaf5ce51cbc473827bfebd783b949f161b29bc1142f630ec10338778d145ca7cb0240ca05f51c51af2d9bb245c3a2358e282ca83546450e9d7d26f1c1ff759707389d31e42d6a2b4d1fae022083a1f133c13abf88593aee44d1da045855c3d7ddca268090d586edc97fd17717ea227ea4c2ea11686ad3dcb6f5badad8f3ee06849e8efed8aea1a8714d089f363"}, &(0x7f0000000200)=0xaf) 12:54:13 executing program 5: ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000200)) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) semget(0x0, 0x0, 0x102) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000340)={0x0, 0x1, @raw_data=[0x7fff, 0x3, 0xff, 0x2, 0xffff, 0xa6, 0x0, 0x0, 0x5, 0x7, 0xefba, 0x6, 0x1, 0x87, 0x80, 0x4]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000002c0)=0x80) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000480)) r3 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000440)={0x3, 0x6, 0x5000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000580)=0x44) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x10001}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f0000000200)={r4}) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="e303eb21a92bd05bd543987132b0a300fbe699376eebad8ad454c45a14ed58ac7ed709e87e6c175e2457c1781b3f6e71e45af2912e8f1e387c08994e11310c230ad7401911774d2e"], 0x15, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x160) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) sendmsg(r0, &(0x7f0000000080)={0x0, 0x24a, &(0x7f00000001c0), 0x3b4, 0x0, 0xe0}, 0x0) 12:54:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d008105e00f80ecdb4cb9f207c804a01c000000d00300f80a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x7, 0x14, 0x9, 0x8, r3}, 0x10) 12:54:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$netrom(r1, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1c, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], &(0x7f0000000180)=0x4) 12:54:14 executing program 4: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000140)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20002000005) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfffffc8f) tee(r5, r4, 0x100000000, 0x0) read(r3, &(0x7f0000000000)=""/184, 0xbfcc8116) tee(r3, r6, 0x80, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000380)=0xc) syz_mount_image$erofs(&(0x7f0000000180)='erofs\x00', &(0x7f0000000200)='./file0\x00', 0x2, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000240)="b61f2d71cdaf6819f8dac8fc9a6cf71bb86417e0e2d487e7409579da59163cecc7aa2b9097ecc2cbd7293f", 0x2b, 0x80000000}], 0x10009a, &(0x7f00000003c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x8}}], [{@smackfsdef={'smackfsdef'}}, {@euid_eq={'euid', 0x3d, r8}}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, 't\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05'}}, {@subj_user={'subj_user', 0x3d, '/proc/self/net/pfkey\x00'}}, {@uid_eq={'uid', 0x3d, r9}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio='permit_directio'}]}) [ 194.169332] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:14 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x6d6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x311}], 0x1, 0x0, 0x0, 0x1f5) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x40002, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x3, 0x288b00) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0xa) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[], 0x0, 0xfffffffffffffd68}, 0xffffffffffffffe2) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) setsockopt$MISDN_TIME_STAMP(r7, 0x0, 0x1, &(0x7f00000002c0)=0x1, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f00000001c0), 0xfffffef3) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x1000000000000000, 0xfffffffffffffffc, 0x0, 0x2, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x1f002}) ioctl$KVM_RUN(r6, 0xae80, 0x0) 12:54:14 executing program 2: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0x1}, 0xff7f) r1 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x9) r2 = socket(0x11, 0x80a, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000180)={0x6, 0x80000000, 0x2, {0xc, @pix={0x6, 0x5, 0x4c048a8832c51251, 0x4, 0x100, 0x3d9, 0xa, 0x9, 0x0, 0x3, 0x3, 0x1}}}) r3 = dup(r2) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100000001, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) setresgid(r6, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) setsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) ioctl$TUNSETGROUP(r4, 0x400454ce, r6) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r8, &(0x7f0000001300)=""/214, 0xd6) [ 194.545843] audit: type=1800 audit(1572008054.612:45): pid=7866 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16551 res=0 12:54:14 executing program 4: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x7d, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x101df) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={0x0}, 0x1, 0x0, 0x0, 0x5c7d07bddfbf6754}, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0xa}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000001080)={@local, r4}, 0x14) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") 12:54:14 executing program 1: r0 = timerfd_create(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r6 = fcntl$dupfd(r5, 0x0, r1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) setsockopt$IP_VS_SO_SET_STARTDAEMON(r7, 0x0, 0x48b, &(0x7f0000000080)={0xc17979ad9b73c0ac, 'irlan0\x00', 0x4}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000280)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@gettclass={0x28, 0x2a, 0xc2863177b056cf9d, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0x0, 0x5}, {0xa, 0xffff}, {0xffe4, 0x16}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x8041) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000040)) [ 194.808065] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 12:54:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet6_opts(r4, 0x29, 0x36, &(0x7f0000000000)=""/47, &(0x7f0000000040)=0x2f) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x5caad999, 0x0, 0x0, 0x362) 12:54:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$netrom(r1, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:15 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000040)=0xfff) r1 = socket$unix(0x1, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001300)={0x0, 0x3, 0x6, @dev}, 0x10) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x29) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) 12:54:15 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001480)='/dev/dlm-monitor\x00', 0x882801, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000001440)) r1 = getpgid(0x0) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x8001, 0x5, &(0x7f00000012c0)=[{&(0x7f00000000c0)="1127af71cf6ce69266a3bd91b22b480e41b725a2dbf6d3320b", 0x19, 0xbb6c}, {&(0x7f0000000100)="faf3bc83a9c566badade1edb27994dd7302cac869524f8fd595ef5da7f38589c04ead965f14725370a81a9fb106934124ab5e268659b4f5f0e5b49af3eb08fb9051b170eef6f5d1c5ece7eccc6967abb1106257074382e2c4de8801bc2520cc7f22c5e7c1ca9f859225fc8ec63fa6855a578f0bacb856ba0aac4fc6dd319aec8ec36f4eb99d219e5fd9ba12a3d382a7d4686c6d2a8c893fec9a86c9294886575733cf9ce3ee6467d068268b8dad5b643921149b486b05988d7037a", 0xbb, 0x7}, {&(0x7f0000000200)="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", 0x1000, 0x1}, {&(0x7f0000001200)="08064899074edf79b661a8c77c559676b23af3f7ad1327077dff88b493075737bf68e79c95f4e012516778a7c15bafddcb154a9d035196592a6e668cf3a0e42dce0a0114f920a005acabdbf65042f43acef6d244409f26f52930848c526ee417f3b0fe4820a8f8ad23ce2e47f47803eb9e4dc126e9230285de573d81318fa18f", 0x80, 0x4}, {&(0x7f0000001280)="45617e68f8325f517542dc3215974b8b5191605d136ac70fd1d61796156c2051a0eb04d19b8545b4d9690dbc796b251acc39121f596429b711f1595c5be783a1", 0x40, 0x240000000}], 0x0, &(0x7f0000001340)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x1}}, {@fault_injection={'fault_injection', 0x3d, 0x1ff}}], [{@permit_directio='permit_directio'}]}) ptrace$cont(0xffffffffffffffff, r1, 0x1, 0x335) perf_event_open(&(0x7f000001d000)={0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) [ 195.184683] erofs: read_super, device -> /dev/loop3 [ 195.198525] erofs: options -> nouser_xattr,noacl,acl,acl,user_xattr,user_xattr,fault_injection=0x0000000000000001,fault_injection=0x00000000000001ff,permit_directio, [ 195.215719] erofs: cannot find valid erofs superblock 12:54:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r4, 0x3ff}, &(0x7f0000000100)=0x8) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "25ca080000007200", "4b46becc9719ca3ebfd59f2490a2688a", "6d6fc0ec", "199d72551538871b"}, 0x28) sendto$inet6(r0, &(0x7f00000000c0)='$', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x155, 0x0, 0x0, 0xffffffffffffffd2) 12:54:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='debugfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20, &(0x7f00000001c0)={[], [{@uid_eq={'uid'}}]}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={r2, 0x6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r3, 0x6}, &(0x7f0000000200)=0x8) [ 195.504826] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 12:54:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x10001) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000000)={0x2, 0x1c, [0x9, 0x20, 0x1, 0xda, 0xfffffffa, 0x2, 0x1]}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback, 0xfffffffd}], 0x1c) 12:54:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) r1 = shmget$private(0x0, 0x1000, 0x1, &(0x7f0000002000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff08004500001c0000000000118978ac14ffbbac1414bb00004e2000089078"], 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) read$usbmon(r2, &(0x7f0000000040)=""/12, 0xc) 12:54:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$netrom(r1, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e26, 0xfffffffc, @loopback, 0x3}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="08001f000000000100010000000d00000000000f"], 0x14) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x0, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) 12:54:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e26, 0xfffffffc, @loopback, 0x3}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="08001f000000000100010000000d00000000000f"], 0x14) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x0, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) 12:54:16 executing program 4: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="039afa174fc1f2d22709a36a541e606e6c733d637038"]) r0 = request_key(&(0x7f0000000100)='u\xe7F\xb0\xbb\xb6\x9f\x8d=\xd7\xa2\x91\xa0/y\xf4\xb5\x11\xde^\xdc\xe7\x9cA\x0fW\xd5\x80\xcdQ\";\xf6.\x02d\xd3w7+\xd1\x00\x00\x00\x00:c+\x81\x7f\x97\x01X\xa0W3X\xc7,\xf3F?/z\xdd\xacm\x9cn\xb6\x00\x00\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='none', 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11f8a50d5e0bcfe47b") ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r3, 0xc0086423, &(0x7f0000000180)={r4, 0x1}) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x200, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000000)={r4, 0x3a}) keyctl$get_keyring_id(0x0, r0, 0xdf) 12:54:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e26, 0xfffffffc, @loopback, 0x3}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="08001f000000000100010000000d00000000000f"], 0x14) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x0, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) [ 196.154310] ntfs: (device loop4): parse_options(): Unrecognized mount option šúOÁòÒ' £jT`nls. 12:54:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e26, 0xfffffffc, @loopback, 0x3}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="08001f000000000100010000000d00000000000f"], 0x14) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x0, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) 12:54:16 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x81) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'dummy0\x00', 0x0}) r2 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x80}, 0x10000, 0x0, 0x0, 0x0, 0x2}, r2, 0x0, 0xffffffffffffffff, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 12:54:16 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="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") 12:54:16 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x5671, 0x200d, 0x0, 0x8, 0x1, 0x18fd55d1ca255f35, 0x1}}) r1 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000040)={0x0, 0x0, "41876be3caf9636322f10b34e78d070f407cae6e7851b7f0"}) [ 196.599896] autofs4:pid:8005:validate_dev_ioctl: path string terminator missing for cmd(0x0000937e) [ 196.638991] autofs4:pid:8007:validate_dev_ioctl: path string terminator missing for cmd(0x0000937e) 12:54:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$netrom(r1, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)=':trusted:%^nodev\\)\x92(\x00', 0x15, 0x1) r4 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007007fffffff00000000000000385a58000000000000000000000000000001000000000000000000fa0000000060000000000009a1e5"], 0x2ab) 12:54:16 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x7e1) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 196.802557] SELinux: failed to load policy [ 196.827464] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:54:17 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x200a00, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) process_vm_writev(0x0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/94, 0x5e}], 0x1, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/174, 0xae}, {0x0}], 0x2, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$cgroup_pid(r1, 0x0, 0xffffffffffffffc2) write$FUSE_IOCTL(r0, &(0x7f0000000700)={0x20, 0xffffffffffffffda, 0x0, {0x1, 0x8, 0x0, 0xcd}}, 0x20) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xed9e77889c53b7bf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x11}}, 0xe) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0xb5ee73dfb4213153, 0x0) ioctl$SIOCRSGCAUSE(r4, 0x89e0, &(0x7f0000000140)) listen(r3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005080)=[{{0x0, 0x0, &(0x7f0000000940)=[{0x0}], 0x1, &(0x7f0000000980)}}, {{&(0x7f00000009c0)=@ethernet={0x1, @local}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000000ac0)="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", 0x768}, {0x0}, {&(0x7f0000002bc0)="513888765e4eed6d7e8a4a9147eb2f88d3438c9b7f30dfdc5aa9a181445f14ef1ca5c14fe3ae1a4d2570e4653c93393fb7e2e285a38d716183f40a0fefb790af7582ca43fb9eecc936652d9750b5a1e9911fd233e9d1808206315678b262", 0x5e}], 0x3, &(0x7f0000005240)=[{0x90, 0x114, 0x10000, "43627d7286c6e35872bda63a7f92a279c36268bf26f4c1e6395e4337fd7068f3c431b120753dc5a4a2cecedb45e1e2b432017fe0b8f6a1059dcf5ec1616600b44ea5ac47093ed7e25c7779649f6f4ca95f24b3b7fe8ccd458f2178ae74841579f00ff1869050607f7c0322484d875ed71fc9bfcc0f10fd627e48d1b7"}, {0x10, 0x108, 0x5}, {0x18, 0x104, 0x7fffffff, "90d3"}, {0x10, 0x0, 0x6}], 0xc8}}, {{&(0x7f0000002f80)=@ipx={0x4, 0x8, 0xbc5f3833, "61b5f3635ee7"}, 0x80, &(0x7f0000003040), 0x0, &(0x7f0000003800)=[{0x10, 0x1, 0xa015}], 0x10}}, {{&(0x7f0000003080)=@llc={0x1a, 0x311, 0x0, 0x3, 0x9, 0x0, @random="0afa203bce2a"}, 0x80, &(0x7f00000034c0)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000004840)=[{0x90, 0x0, 0x0, "2e84113c057d179174ad38b85de48a832232568dd110364508cef1bc87082ae709a74d2ea55794ee2aafa1b2fcbadeda0204c3f063336003ca53328cec565efb3249e06a504a21cca4d48f42ad678246f0d6e967ae572c30d61dd8c90822459f62b36b4056229495a777712a5f33c53c16a776154af3d4d12d40ddcd28f75a"}, {0x10, 0x88, 0x4}, {0x18, 0x104, 0x9, 'S'}], 0xb8}}, {{&(0x7f0000003540)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @loopback}, 0x0, 0x0, 0x0, 0x3}}, 0x80, 0x0}}], 0x5, 0x0) 12:54:17 executing program 4: openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) fsync(r0) socket(0x9, 0x5, 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x20006, 0x0) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x6d6fcc9c65778cce, 0xb0) write(r3, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="00fb3406f9e99d4ef8c13d9ac40c0f9383cbc4a6fbf7c29450a65cfddfb38846083dcfeb4ed890028f2c01e8f5c83513ba8e5095ceb1292180f7806f1abb78ac5b3debde8f00879cc8185f5891ab34ee3e3abe9b94b16f9ef9a2ee65c4a097e3fa087f58ba16f2414251ee2b2bcd8656b424ca70242eb79577ab935086c822e4ad2084b86cbfba3ecf9d0a04a721f690997dd61649c739ca36671264551dd700000000000000000000000077fc6359437fc3b20d2244ae8d184ca334dc37fc54a8e1a9e792a77a52ac0691a8936045ab499aae8a5b6f292e74b254fc7f65c7c02dfd7a3912b2f283bd64a5229bff07efd6cb26b28539751d424b054a1862a1f72f532c66a2db5c8342f4c8c470053cbccec7cc3405c38f1dfdc0d2b36e8c1ecdfa2d5bf4"], 0x34, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, r4, 0x0, 0x100000008004) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') chdir(&(0x7f0000000680)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) [ 196.972982] protocol 88fb is buggy, dev hsr_slave_0 [ 196.978335] protocol 88fb is buggy, dev hsr_slave_1 [ 197.149888] audit: type=1800 audit(1572008057.212:46): pid=8028 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=5 res=0 [ 197.197833] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 197.235605] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 197.257756] FAT-fs (loop4): Filesystem has been set read-only 12:54:17 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x7e1) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 197.347786] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:54:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 197.617999] SELinux: failed to load policy 12:54:17 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x7e1) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 197.719472] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 197.841776] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:54:17 executing program 5: ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f00000004c0)={0x1, 0x0, 0x1000, 0x0, 0x0, 0xa7, 0x0, &(0x7f00000003c0)="c669745411af35a11a176ea21abcea2bc60978db2670657ef53354e3c9d01468fcdc05e65ae31ce7c3727287d2edfa6312ac928ff06990d6c2b7e66ea7c3d9e26c82e55067ed458ac022d6845ddb680bd20d44999f3e1eb57e3fa91d55835936e18629c1acd90ee8c9b3d5eaf2b30d5ad1233be3f8c88d850300b201faa850f052b846281b078711780710d5d4aaeacf2b0352d3d726dd27c203ab16eba2eb6edaa0876426065b"}) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@enum={0x9, 0x5, 0x0, 0x6, 0x4, [{0xf, 0xf5c6}, {0x9, 0x200000}, {0x8, 0xfff}, {0xd, 0xfffffff9}, {0x0, 0x101}]}]}, {0x0, [0x61, 0x5f, 0x30]}}, &(0x7f0000000540)=""/223, 0x51, 0xdf}, 0x20) ioctl(r0, 0x5, &(0x7f0000000000)="bae677bcfc3be1b7979948003d49f0e78c370d6ffb0699e26360965b3b490d9b4b6fd783ae1f325d84338c2d93bb5ee668faf6cbe3bb470b0ad55fe6e1d1b914f9b6defbc231eb7ca0e521d298958cd7460f24e7d82a94aac58a2febecddf0b7b6659619129fb2000400007352588c8bcb4e3e2162682e63a89a740fb910511d029085e20aec741f011c23bb96cea4d7cff9eff7ec7844e4be6ea7f252577a0ba298ba9f52f7850d3e68b8f58fc810") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') setgroups(0x54b, &(0x7f0000000180)) pread64(r1, 0x0, 0x0, 0x0) 12:54:18 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x200a00, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) process_vm_writev(0x0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/94, 0x5e}], 0x1, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/174, 0xae}, {0x0}], 0x2, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$cgroup_pid(r1, 0x0, 0xffffffffffffffc2) write$FUSE_IOCTL(r0, &(0x7f0000000700)={0x20, 0xffffffffffffffda, 0x0, {0x1, 0x8, 0x0, 0xcd}}, 0x20) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xed9e77889c53b7bf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x11}}, 0xe) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0xb5ee73dfb4213153, 0x0) ioctl$SIOCRSGCAUSE(r4, 0x89e0, &(0x7f0000000140)) listen(r3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005080)=[{{0x0, 0x0, &(0x7f0000000940)=[{0x0}], 0x1, &(0x7f0000000980)}}, {{&(0x7f00000009c0)=@ethernet={0x1, @local}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000000ac0)="03680db77839819628e8edccaf57e461acec3a0d6a6a94567c3f7f758bfa6ac059f3840c107ae8e80f8d8baaa8b37ada81e63b7a5bd35d4326f0ddc0a2cd950cd14a0cd3bdc9c5dd5c670227bb7b53b4278ec5907ea21534b893f80d936fea37618bbe8acf69e5f6adccb1d5e2e3340d35d6e4967db2c4f24ff4ea6753517210db867644abdf09baf44625cfe2cd326c1191337e4a10bd86f304c633a024450f0f2954debb315449b4ccf7af41ca88f06ef045837af9d5f07b8582dc3a450426def1a7046aef249247cd4487b5a8bcec51730765556cf993627cda0f24ec78696ad5b02d720c260a80efc342f439097aaa033810023f5680b0ef750789193fbd2d84ea7f2f442ec7e0078b1ad0987def1a1d22e00db8bbab3a8aad4505fa3dc4a6492ccee6c8af7634f4923d8c901af1975c3b504302a88d2ea20c4ad61e28529b7e43cc711d5e820d8670e25d568b58524fa477db80a78a7cc0cccabf307629267bf8ec66e0f9c67749dcb4a13f3b1ca778bb079ca3ddf480771cbd57e71306b153b24240f6473e36556fe9eeb870707f0697276a238d02a8662627e46ad1b3440e261ef35398094ffef652b044a02cf5eef033c0444b5636cf77b51daf7129b5d8aa34a0b2a9385cd01f3305293b980247a6bbbae42cb6cdb7075b07e0edea79ea0063956ecf88b0bc67af75f336871d12475447b7f23298bf9f8a8aca4871ae913083ce41429ca751934f022db8444bce5e7f94d530713012ffd8383f0e624177006fdc9cd267ea77cc8455349f54e9fea586f8221aac65ca7ba75dbf7c439deb1a5e6f03f84198ee03c85c0b2ebbcf1ae86b55346a3d584f904208bbc08fc15f061db05c16d073698c7b21a392231560886357fa367506f6bf67ae0cff950f2b84cc82858ced820b22c471d2c295ecedce0e159e396e2e141612b784c541ba8bd955f13001e96aaa8de2a3371ef841099ea4c10987509d470b8ac29a7c01b7b379bf9da53af922e7a55a9852bca7009a6e28e765a4f82c463873847739161f798c519ac39f21fdf287ea28394dff7cac694a7452f5c28d77ef07d3ba0245b072f002869c01a6ff906ee15513bbb761f315aa7da331be22292dcd9506549736f3d2c96eb967773f749ab480f42b60d548dd56dcd53034e3c587f170cd9e0a299a2b17921f2c9b9c280d6fe166392747d5fb1d9ec583a8300ef58de19bc85c3fb99a17af83fc4b45e46960db85aadaade34014d66b07515a20af92765f67386c422f6e2b07716a6998344cf8c9fd97f14a7bc7cf2a13bb908e56f8e299245d1430ba3f2c742147f49ff6736843dc17915f03b5d599ba7da936754c131a6045743af60484bbcffe9a79fbadc9fdb6237a73bb16637a9abb713fa4fd42ac586efab3dcaf1e2ea3da4e9c30262bf4e8b81db6a1f67527c64787241a6b54faec920da2cb5c9d0c5c44c083c99f4c74e6f734a0a5b147d2f2377677458c90c73c708f0b27b55d26dc8e8e415c33f6d09f56dfdcae8cad9b70342f47d0a2956ddfa44bd5ac72c4ab5ee0f04a74fce5a654bb1c71ef73cf8451c55a3cb3983a2ad8e7b97758c95ee0622af9c35df8bb9ae0132a9d382fede0f52c5d44bca29fe9e8eb52ae531cb1a8d2f1c827a504c616b3513612c8289045b4d735e440920b750d9a820ba9eacac76caca99357b2031154f478fc9b107497b27a9784e2fe2f29d29e77987cb311ec692ee736b297efa53e76a6fd9d4effbb30d5f55ae1aab9c993c64fff3f3d9bf0681dc7930316cf0541455cc9c1f24d589cd2ee65aee7aaf036a244f60b9227761130f21406bda373f32e9bab478d66255cfa8bcc0d8c39c9769eabad60425782cb151e1bd1ddde4d6e3d0afe340e1b011f08d5c6b5e0ab30e7bed06b2d494f4cbc6e27b631f8dbe36d5b51b42020c5b96deb57df5248b7e8ec052e0d747510d02b5155c91d08abf5e139dbce22d56d909e84542791f3fe0f321606fc66a6e9545835a1f8f93d97cb4abe342f042ff2e1ddb5b64f1916d16420dceb622a5a47bde051ff435421f9459c556f7d2947b04e709cba9f21384ecb6d94ad12144b9470e2f75e01e4bd84da047f81b7ac531e183dc44f96c829f657deaab8d56cc85670259a6e2aa6d974b7608411cbc60f68aeabf8ab1d8be6b0f46255751709ed666fa09172e5d8172b8708c80147abe12be1f4bb67676119d804b8676892b0cc483623f6748779d78af0ecf01166c4c4bdf23d3c54c318148937bc69f0e7ad523dbfdb6ea406ede0d593e804757162a37116934492412286f3c8757afe1d11be2c21fd2e6e217e9ebd9ddf20a6d3bebb470308a1c89b56add0e865704502847ffc491f2dc6b05b87c49e6611f2b58814425989877c729a8eab766f9594e1a2c9db50c1cd002b4cfebc26203c4edad6f9df99833b8db3db8e4bd12d55ccc847872812796a601797ddd32edf9832e541012b899d403b1ba384a76dc6562dd5d35dfcf10905ebf49a8f40a9a815bc80fefd0e0a475b7faebcb14e8252e290bab691d7d45b548c02cf8ff805e8db5110277d8419e9371554e30740fd257f607efbbdcd9510dbf11aff51bf167a5e6505e1b087790c1951563133a01db73bef51a35fb4260f04d058d9e819cb7c1832b1d9fbaada91cad353ee98d10c362dfb81048919824685", 0x768}, {0x0}, {&(0x7f0000002bc0)="513888765e4eed6d7e8a4a9147eb2f88d3438c9b7f30dfdc5aa9a181445f14ef1ca5c14fe3ae1a4d2570e4653c93393fb7e2e285a38d716183f40a0fefb790af7582ca43fb9eecc936652d9750b5a1e9911fd233e9d1808206315678b262", 0x5e}], 0x3, &(0x7f0000005240)=[{0x90, 0x114, 0x10000, "43627d7286c6e35872bda63a7f92a279c36268bf26f4c1e6395e4337fd7068f3c431b120753dc5a4a2cecedb45e1e2b432017fe0b8f6a1059dcf5ec1616600b44ea5ac47093ed7e25c7779649f6f4ca95f24b3b7fe8ccd458f2178ae74841579f00ff1869050607f7c0322484d875ed71fc9bfcc0f10fd627e48d1b7"}, {0x10, 0x108, 0x5}, {0x18, 0x104, 0x7fffffff, "90d3"}, {0x10, 0x0, 0x6}], 0xc8}}, {{&(0x7f0000002f80)=@ipx={0x4, 0x8, 0xbc5f3833, "61b5f3635ee7"}, 0x80, &(0x7f0000003040), 0x0, &(0x7f0000003800)=[{0x10, 0x1, 0xa015}], 0x10}}, {{&(0x7f0000003080)=@llc={0x1a, 0x311, 0x0, 0x3, 0x9, 0x0, @random="0afa203bce2a"}, 0x80, &(0x7f00000034c0)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000004840)=[{0x90, 0x0, 0x0, "2e84113c057d179174ad38b85de48a832232568dd110364508cef1bc87082ae709a74d2ea55794ee2aafa1b2fcbadeda0204c3f063336003ca53328cec565efb3249e06a504a21cca4d48f42ad678246f0d6e967ae572c30d61dd8c90822459f62b36b4056229495a777712a5f33c53c16a776154af3d4d12d40ddcd28f75a"}, {0x10, 0x88, 0x4}, {0x18, 0x104, 0x9, 'S'}], 0xb8}}, {{&(0x7f0000003540)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @loopback}, 0x0, 0x0, 0x0, 0x3}}, 0x80, 0x0}}], 0x5, 0x0) 12:54:18 executing program 4: ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x57, 0x1, 0x2, 0x0, 0x0}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000100)="1836b9d30f38034b38d41f8160521148a62af4fb65f7aec787b776f7cc5604b79da0e5d4f06743255d5288719420ec"}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) splice(0xffffffffffffffff, &(0x7f0000000140), r1, &(0x7f0000000180), 0x0, 0x2) 12:54:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) keyctl$session_to_parent(0x12) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) chmod(&(0x7f0000000000)='./file0\x00', 0x0) 12:54:18 executing program 4: ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x57, 0x1, 0x2, 0x0, 0x0}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000100)="1836b9d30f38034b38d41f8160521148a62af4fb65f7aec787b776f7cc5604b79da0e5d4f06743255d5288719420ec"}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) splice(0xffffffffffffffff, &(0x7f0000000140), r1, &(0x7f0000000180), 0x0, 0x2) 12:54:18 executing program 1: ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x57, 0x1, 0x2, 0x0, 0x0}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000100)="1836b9d30f38034b38d41f8160521148a62af4fb65f7aec787b776f7cc5604b79da0e5d4f06743255d5288719420ec"}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) splice(0xffffffffffffffff, &(0x7f0000000140), r1, &(0x7f0000000180), 0x0, 0x2) 12:54:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000140)) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 198.813270] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x4b, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0x0, r2, 0x0) r4 = socket(0x10, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000240)={'veth0_to_bond\x00', &(0x7f0000000180)=@ethtool_test}) kcmp(0x0, r3, 0xda47135e14e5682a, r4, 0xffffffffffffffff) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x20000000fb, 0x0, 0x0, 0x0, 0x0, 0x800], 0x1f004}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 12:54:18 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xb8}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='(\x00', r3}, 0xe) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(r4, &(0x7f0000000400)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_setlink={0x44, 0x13, 0x200, 0x70bd25, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_XDP={0x1c, 0x2b, [@IFLA_XDP_FLAGS={0x8, 0x3, 0x8}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x8}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x2}]}, @IFLA_TXQLEN={0x8, 0xd, 0x9}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x80) write(r5, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440)='/dev/hwrng\x00', 0x10220, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r8, 0x5380) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r9 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 12:54:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000340)={0x5, 0x0, [{}, {}, {}, {}, {}]}) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, [@IFLA_VTI_REMOTE={0x8, 0x5, @multicast2}, @vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r2}]]}}}]}, 0x40}}, 0x0) [ 198.978701] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x54, 0x0, 0x0, 0x3}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x20000}, 0x8, 0x10, &(0x7f0000000000)={0x5}, 0x10}, 0x70) 12:54:19 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaabaaaaaaaffffffffffff0080019078ac141400ac1423bb4418000008009078000000000107b773664d442cefbd6e133970064b5623e1f703c78e0dc67f328b641f0a288d72f44ec6c1c233513118f291ae173ff86cd4a147d6e3"], 0x0) 12:54:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002b00050ad25a80648c6356c10524fc00100000000a000000053582c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 199.204878] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x55c00, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000340)}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/197) keyctl$instantiate(0xc, 0x0, &(0x7f0000000480)=ANY=[], 0x0, 0xfffffffffffffffb) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) r4 = open(0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000280)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r5, 0xc010641d, &(0x7f00000002c0)={r6, &(0x7f0000000540)=""/4096}) r7 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000100)={r8}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f00000000c0)={r8}) ioctl$DRM_IOCTL_DMA(r7, 0xc0406429, &(0x7f0000000180)={r8, 0x0, 0x0, &(0x7f00000000c0)=[0x10001, 0x9, 0x8, 0x1, 0x7fffffff, 0x62], 0x20, 0x4, 0x8, &(0x7f0000000100)=[0x5, 0xffff, 0x401, 0x0], &(0x7f0000000140)=[0x1, 0x7, 0xffffffb4]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000480)={0x0, 0x3a}) openat$cgroup_procs(r4, 0x0, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000180)="d90a21acf5f2d036da9d528e441702255248e6e6eb56d89867c9a1b92152cbbd2860fe30d3d45e0a67d2a9ba45d5d56a03a830490e4a14530f45cebfcf00259ee41567a51c52257dc5b11b217f2e6bf4a3f588e74d5b0db8cb6e06e44afcad3dc04a64daf659d8defb2129d44c4efcb3800b23d95d6fd22f0e4ff8254f356e11d0d1b6728d0949bb13ac85b338ab7d6169", &(0x7f0000000000)="3947834cdda9cd1b31edab1337cec6479e0ddb9c34496438b4a22724", 0x4}, 0x20) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 12:54:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:19 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) syz_open_dev$mice(0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) unlink(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x4a) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_proto_private(r3, 0x89ec, &(0x7f0000000440)="d1d96318c4ff43bcae82ec1f55498364667b0a9c54c9cec6c8a85ad9e27a44531336d952e15f24794d7669a124c67da39c7a99dc26f2c6228ea873e356411167d045008b") getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="62747266732e68756765746c04000000000000006167655f69725f5aa2f4f57300"], &(0x7f0000000280)=""/52, 0x34) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r6}}, 0x30) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f00000004c0)={0x9, 0x108, 0xfa00, {r6, 0xab, "7acc20", "1d9eb2e23df1cf4e8e9117e1121f139c7c1fb0f0e09c10aac1e621c771df91de0961807337f2b9b82633abd22c8ad05f38fa237d6c9101e62fee6f5b299f1448c9981106f02396d46949dd4768b070fb3249c1d773594451d8103a8d36d70fa6e6941e13a9cc32396e312e00a1a8c705054b4a499262ea3d944f92b4dfaa150a3025cf24bbd78891326f5ea66e310dea44bc6105024f69a10c1abc9ca85a4ecd5c83b798e043f3249c803e9126495b371dec1b18bd86447f1a8e0406a5544f3c01b17df6e1f132a474347a56f845bd53170f54c3c97c2410485952b9c667bd60a3f4c4990b885379034f2898386d03b41821542a02b242a912ab89d6d5b66e61"}}, 0x110) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) 12:54:19 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r8, 0x0) setresuid(r6, r8, r6) stat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000240)={0xa0, 0x0, 0x7, {{0x1, 0x4, 0x3f, 0x417, 0x0, 0xfffffff7, {0x0, 0x9, 0x6, 0xffffffffffffffff, 0x6, 0x30000000000000, 0x4, 0x1, 0x0, 0xfffffffd, 0x1ff, r11, r9, 0x5, 0x6}}, {0x0, 0x14}}}, 0xa0) r12 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r13, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r13, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x2, 0x4, 0x1}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0)) write(r14, &(0x7f00000001c0), 0xfffffef3) ioctl$RTC_WKALM_RD(r14, 0x80287010, &(0x7f0000000180)) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x80001d00c0d0) 12:54:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x4b, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0x0, r2, 0x0) r4 = socket(0x10, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000240)={'veth0_to_bond\x00', &(0x7f0000000180)=@ethtool_test}) kcmp(0x0, r3, 0xda47135e14e5682a, r4, 0xffffffffffffffff) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x20000000fb, 0x0, 0x0, 0x0, 0x0, 0x800], 0x1f004}) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 199.482632] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 199.726044] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 12:54:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x4b, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0x0, r2, 0x0) r4 = socket(0x10, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000240)={'veth0_to_bond\x00', &(0x7f0000000180)=@ethtool_test}) kcmp(0x0, r3, 0xda47135e14e5682a, r4, 0xffffffffffffffff) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x20000000fb, 0x0, 0x0, 0x0, 0x0, 0x800], 0x1f004}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 12:54:20 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 199.872567] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 199.969828] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:20 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:20 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 200.071224] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 200.154280] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x55c00, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000340)}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000380)=""/197) keyctl$instantiate(0xc, 0x0, &(0x7f0000000480)=ANY=[], 0x0, 0xfffffffffffffffb) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) r4 = open(0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000280)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r5, 0xc010641d, &(0x7f00000002c0)={r6, &(0x7f0000000540)=""/4096}) r7 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000100)={r8}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f00000000c0)={r8}) ioctl$DRM_IOCTL_DMA(r7, 0xc0406429, &(0x7f0000000180)={r8, 0x0, 0x0, &(0x7f00000000c0)=[0x10001, 0x9, 0x8, 0x1, 0x7fffffff, 0x62], 0x20, 0x4, 0x8, &(0x7f0000000100)=[0x5, 0xffff, 0x401, 0x0], &(0x7f0000000140)=[0x1, 0x7, 0xffffffb4]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000480)={0x0, 0x3a}) openat$cgroup_procs(r4, 0x0, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000180)="d90a21acf5f2d036da9d528e441702255248e6e6eb56d89867c9a1b92152cbbd2860fe30d3d45e0a67d2a9ba45d5d56a03a830490e4a14530f45cebfcf00259ee41567a51c52257dc5b11b217f2e6bf4a3f588e74d5b0db8cb6e06e44afcad3dc04a64daf659d8defb2129d44c4efcb3800b23d95d6fd22f0e4ff8254f356e11d0d1b6728d0949bb13ac85b338ab7d6169", &(0x7f0000000000)="3947834cdda9cd1b31edab1337cec6479e0ddb9c34496438b4a22724", 0x4}, 0x20) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 12:54:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 200.288442] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 200.350347] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 200.447808] syz-executor.5 (8133) used greatest stack depth: 20784 bytes left 12:54:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:20 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) syz_open_dev$mice(0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) unlink(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x4a) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_proto_private(r3, 0x89ec, &(0x7f0000000440)="d1d96318c4ff43bcae82ec1f55498364667b0a9c54c9cec6c8a85ad9e27a44531336d952e15f24794d7669a124c67da39c7a99dc26f2c6228ea873e356411167d045008b") getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="62747266732e68756765746c04000000000000006167655f69725f5aa2f4f57300"], &(0x7f0000000280)=""/52, 0x34) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r6}}, 0x30) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f00000004c0)={0x9, 0x108, 0xfa00, {r6, 0xab, "7acc20", "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"}}, 0x110) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) 12:54:20 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0xb68678906de2c788}, 0x0, 0x0, 0x0, 0x0, 0x3884}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = dup2(r3, r5) r7 = socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x0, 0xc2aef5047e871c4f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000600)={0x9, 0x108, 0xfa00, {r8, 0xb4, "f80c46", "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"}}, 0x110) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="31000000000000000000090000003c00030008000300003d0300140002006c6f000000000000000000000000000014000600ff0300000000000000000000000000010800010001000000"], 0x50}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r6, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="4af2ff01", @ANYRES16=r9, @ANYBLOB="00082bbd7000fedbdf250b00000008000400000001003400020008000b000a0000000800030002000000080004000600000008000900010100000800040059fe000008000b000a0000000800060001000100"], 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20000040) r10 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r10, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r10, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f) syz_open_dev$vbi(0x0, 0x1, 0x2) sendmmsg$inet_sctp(r10, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x934) 12:54:20 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) syz_open_dev$mice(0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) unlink(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x4a) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_proto_private(r3, 0x89ec, &(0x7f0000000440)="d1d96318c4ff43bcae82ec1f55498364667b0a9c54c9cec6c8a85ad9e27a44531336d952e15f24794d7669a124c67da39c7a99dc26f2c6228ea873e356411167d045008b") getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="62747266732e68756765746c04000000000000006167655f69725f5aa2f4f57300"], &(0x7f0000000280)=""/52, 0x34) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r6}}, 0x30) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f00000004c0)={0x9, 0x108, 0xfa00, {r6, 0xab, "7acc20", "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"}}, 0x110) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) 12:54:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 200.713980] IPVS: Error connecting to the multicast addr [ 200.757418] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 12:54:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 200.808509] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 12:54:21 executing program 1: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$capi20(r4, &(0x7f00000001c0)={0x10, 0x9, 0x84, 0x2, 0x200}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) ioctl$int_in(r2, 0x5421, &(0x7f0000000040)=0x1) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf3, 0x21fc}, 0x14) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000100)=0x2, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffd83) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r0, 0x0, r3, 0x0, 0x10003, 0x0) 12:54:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:21 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) write(r1, &(0x7f0000000240)='h', 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xa5776b) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 12:54:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:21 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0xb68678906de2c788}, 0x0, 0x0, 0x0, 0x0, 0x3884}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = dup2(r3, r5) r7 = socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x0, 0xc2aef5047e871c4f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000600)={0x9, 0x108, 0xfa00, {r8, 0xb4, "f80c46", "e144628849a9c717d6c2d309058e6410ed4c517e7e3a175a3c0c6f74e31a9b068712fc4530c71fdb6f7aed020a3bda21ca6ad73292fb77177d93a1c832c0de61571dd3bd964c6320c4b1d8f87ca44fc01ab4f613a8401794fc9ab1d4ea89b731077b4e9fc30a658fb67eff144444170ad6281f2121076ee50f5fba419de62a2cfcaf1f0d08677d5fe2a7b677e7824a4a6f8dcfb06aea1d01a7f578a6fca388c8efd5fc3c7d4289514b3b60141566a57983b117a3bc7646695eb4f82dd598d8b8ce90e960a46cbc91ad545ce15e70f1723a31c58505854e9b8295f24e8b0cbfc728fa1aacc4f64a1521ad86a234ec3881e6fec90a917a5b486b1da83b7830b032"}}, 0x110) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="31000000000000000000090000003c00030008000300003d0300140002006c6f000000000000000000000000000014000600ff0300000000000000000000000000010800010001000000"], 0x50}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r6, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="4af2ff01", @ANYRES16=r9, @ANYBLOB="00082bbd7000fedbdf250b00000008000400000001003400020008000b000a0000000800030002000000080004000600000008000900010100000800040059fe000008000b000a0000000800060001000100"], 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20000040) r10 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r10, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r10, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f) syz_open_dev$vbi(0x0, 0x1, 0x2) sendmmsg$inet_sctp(r10, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x934) 12:54:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = dup3(r1, r2, 0x80000) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000080)=""/233) syz_open_dev$vbi(0x0, 0x1, 0x2) 12:54:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x30b01, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000100)={0x2}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffffffffff80, 0x2) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x8c, r3, 0xa14, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20040090}, 0x8018) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000040)=0x5, 0x4) 12:54:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 201.685511] IPVS: Error connecting to the multicast addr 12:54:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x30b01, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000100)={0x2}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffffffffff80, 0x2) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x8c, r3, 0xa14, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20040090}, 0x8018) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000040)=0x5, 0x4) 12:54:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:22 executing program 1: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$capi20(r4, &(0x7f00000001c0)={0x10, 0x9, 0x84, 0x2, 0x200}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) ioctl$int_in(r2, 0x5421, &(0x7f0000000040)=0x1) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf3, 0x21fc}, 0x14) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000100)=0x2, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffd83) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r0, 0x0, r3, 0x0, 0x10003, 0x0) 12:54:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:22 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) getsockopt$inet6_int(r2, 0x6, 0x1c, 0x0, &(0x7f0000000000)) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) r3 = socket(0x0, 0x0, 0xde) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x3, 0x8, @local, 0x7}}, 0xff, 0xfffffffb, 0x80000000, 0x4}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000180)={r6, 0x0, 0xf8, 0x6, 0x20, 0x280}, &(0x7f00000001c0)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000600)={0x2, 0x0, @ioapic={0x5000, 0x3267, 0x0, 0xffffffff, 0x0, [{}, {0x0, 0xda}, {}, {0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, [], 0x5a6}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x5}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x7}, {0x0, 0x0, 0x6}, {}, {0x0, 0x0, 0x4}, {}, {}, {}, {0x4, 0x7}, {0x2}]}}) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) 12:54:22 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 12:54:22 executing program 2: pipe(0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'sy`'}, &(0x7f0000000a80), 0xfffffffffffffffd) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xa8d) r3 = gettid() tkill(r3, 0x30) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) socketpair(0x11, 0x2, 0x7f, &(0x7f0000000080)={0xffffffffffffffff}) recvfrom(r5, &(0x7f00000000c0)=""/126, 0x7e, 0x40002061, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000040)=0x8, 0x4) sendfile(r4, r6, 0x0, 0x80000003) 12:54:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = dup3(r1, r2, 0x80000) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000080)=""/233) syz_open_dev$vbi(0x0, 0x1, 0x2) 12:54:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) waitid$P_PIDFD(0x3, r3, &(0x7f0000000280), 0x2, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 12:54:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0b") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x10, "9cb3bd16eebdcffec004000000000000"}, &(0x7f0000000100)=0x18) 12:54:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0b") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 202.886790] nla_parse: 11 callbacks suppressed [ 202.886800] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:23 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 202.994045] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0xfff) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffc000/0x3000)=nil], &(0x7f0000000200), &(0x7f0000000240), 0x0) fallocate(r0, 0x0, 0x1000000, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000180)={'raw\x00'}, &(0x7f0000000000)=0x54) 12:54:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0b") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 203.345682] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 203.437616] audit: type=1800 audit(1572008063.502:47): pid=8307 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16592 res=0 12:54:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 203.655769] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:23 executing program 1: ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9c7d7ab9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="00070000007f63fee5a91ced23efdff1cc00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454cc, 0x0) gettid() timer_create(0xfffffffbfffffffe, 0x0, &(0x7f0000000080)) 12:54:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r0, 0x10e, 0xb, &(0x7f00000004c0)="a62f04d7", 0x4) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000000)={{0x7, 0x0, 0x1, 0x6, 0x81, 0x7f}, 0x401}) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="240000001a0007041dfffd946f610500020000001f00000000000800050016000400ff7e", 0x24}], 0x1}, 0x0) 12:54:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpgid(0x0) ptrace$cont(0xffffffffffffffff, r1, 0x1, 0x335) r2 = syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_mr_cache\x00') ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f00000001c0)=0x30800001c) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000018c0)=ANY=[@ANYPTR=&(0x7f0000001800)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="1bd40dd3f61c85ba65eaa530017ea0fb2952b9b01f3fbb04a09bcd65ddf0406d30394da986ddc4b06605da1c89cf782238aa0fb1f797916fc2a5a3045eb64a3b4ae17e6b99772b032b7d89e0cf9496c644f4255bdebdd0db237d383d1cf60eb551064c8bc5d6b9a9e2ca2cfa5188aa1fc62f5319fb0e1697583c9518ab6f74d3b7148834da4051d699b8a53e07de986c27f4c915341353588e60bf8ee147b2b1fae2183b5eb0"], @ANYRES64=0x0, @ANYRESOCT=r3, @ANYRESDEC=r4, @ANYRES64, @ANYRESDEC, @ANYRESHEX=0x0], 0x7}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) clock_gettime(0x0, &(0x7f0000001740)={0x0, 0x0}) ppoll(&(0x7f0000001700)=[{r5}, {r6, 0x1000}], 0x2, &(0x7f0000001780)={r7, r8+10000000}, &(0x7f00000017c0)={0x4}, 0x8) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r10 = accept4(r9, 0x0, &(0x7f0000000000), 0x41800) getsockname$packet(r10, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmmsg(r9, &(0x7f00000016c0)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="551d644aa86b82c5e5a57d86b3ee468a9cbc110c41dfb0ca7f53bf88641b610c1bf0ad9b83e2647bb038f58cc3f0cc25e9fcd428e107121ddecc9dd35b2bd4eab9f4408b72306a230d83ed574e5f2c0f727c1490b74a1cdea22a31009e259d776d620e75fae00ab745c2017b2b89c4ed731899d8e000870c85ef4a117628c6e8bf98e81a608bc00e912c39c992073106a5aebef8e384144a1aef8f2fc410b1d475cf26b3060fdcf5e44a73044ca925b3b1980878928a099ba35a0695aa724b95ae56905beca6b46dad76b3942cf8810005b5e4b101be2ed539ceb9aa6a1be839e3c64811fd54c7bdff2b", 0xea}, {&(0x7f0000000340)="3b454cdf039e61a8e4e5ec406108158c09f80148b5b35519ae00348bb60d90dd0560aef02ed65a466d98805f", 0x2c}, {&(0x7f0000000380)="6760bffe1d48a9596b4d8f05a84f01b71795f39be487698218bf7eda73e6b7d142142b8a50a5a7da9ffb43a381df735d3391f1b2d7fe", 0x36}, {&(0x7f00000003c0)="c35b5be0fd04fd8e2bff2712028e8de5ae851e7a122db6fdd89006e986baae59394ea803878976", 0x27}, {&(0x7f0000000400)="17b2e2cc3b258ee3c13deb2767e019cba0d5717d9ef0ff22ed7dbb14f2d039887ff7acd3dbf811b5a9f5f19c39c4571276f56d7092f494321d883064c106cdd1", 0x40}], 0x5, &(0x7f00000004c0)=[{0x100, 0x104, 0x0, "61c2fc6dabaf628f978b59928275f4b1a94fccc8c1a170ab5ab12f5d449e967b9630ba1d6518ba0bfe5c26ecf19dba690a2fa077f8233ecf9914be633f8afad76258d8351c5cb944dbd145800a263137c9cf6ca7475a4275a1b5b73df5a830847cbc93f820a738e9f7db70eb3164bc77ece44f0b8f18d6f1699b6919b6d02be6a6faf3eb248d9bc4e76aa864d031a51972af7b47cf3b481c30a98940005e83b7ebd4b69ce4240ed06d967804723a9b91d25ee5acf797213e90beb4ffe0f9144c677da22a13870aae4337abc28edabf8293b404859416fdf0ce5a2230706a136252fc48fbfb0b3c8a2514f058d426f23b"}, {0x1010, 0x9, 0xda180000, "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"}, {0xf0, 0x19c, 0x3, "c9b8c390a053154e8c61abfbb4010cad5af5591b18f497a70a99f12966da4bcb85d68542223305b6a93bf09adf379d4e6ae445d671238697501070371fbf710f4093399bd0ee46bff05b417e268bd7f4cb645aa1156d6f13b4fc7c11d91964281d79e2d192ac139758d2b5c23b27261389484e0b45a1e5aa179d74a2c7c4179b364f22143ae657f8502902d5c63eaaf257e842a873701ab05c128ecfbecd0597959ee291c19ad8ab242ffd3a0dd50f2afebbb09e122ef0f0d4f1aec7ec83b890ae9cd5c3892bf1a5705f0ce4a05f37d8b17eb7da06d3d5a6c5a4e0"}], 0x1200}}], 0x1, 0x4000000) 12:54:23 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) exit_group(0x1) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/access\x00', 0x2, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r4, 0x4040aea4, &(0x7f0000001600)={0x6, 0xfffffc01, 0x4, 0x4, 0x5}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x10}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r8, 0x4040ae72, &(0x7f0000001540)={0x3, 0x1, 0x5, 0x2a41590ef350cb9f, 0xa32}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x10}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r10+30000000}, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x10}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r11+30000000}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r12, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c000000030005f20000000000005537dc6dffe4b6bf3d4ca088ea880c6ef8e3f2dfb317019bbdb6a69860785b189cbf37d996fa9b2c27307571016fa773a77a", @ANYRES32=0x0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="a986b016c9d820d8af8fa7477d2fe0c1502a5a9990bd", @ANYRES16=r6, @ANYRES16=r7, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYPTR, @ANYRES16=r1, @ANYRES32=r0, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB="9fb8d110785568f730d95a468d5a93858ae7b5edfd4814c188fa09330b68735d6b9b2adc5f50bdd74170d6944d915c81a8f3fd6e1176ad41c4332581825368947533df3c256e9b1c035aa8d9cbf78511fd8d58756254e236e5e93d0d39dccc9d509724a2e9bba6e2fdaa808501e0c7cd0b57b16ca262ed5c43d4faf5a4ef6174a5c09b478c068329ae8ef723e1905a5e9bdcd22660df0cb10f37da07ec178375c151bd890f3ba8f5b65186f8acc50c2581679c5c8587d785dde599f1bebf5d04a0ba080e8fad59c177430b465b094f012dcf199ab2b5af51ae99d20cadf1c6b9053852b797bda3ea4a2f66eb7587"], @ANYRESOCT=r2, @ANYPTR64, @ANYRESOCT, @ANYBLOB="e55275840955f1ab19ae6e2a13920cb6aa0578179b9e035e8269d8498a80dd96910f31c4f28a055e3921b7103b3e6625068160bba49e19864779fc29741967f0f9d90809cf98ed99870ae2f2a165863d630fffbe8630949a489d5dd1faedc87f9d758da088073f20337f0e0c186b96caa44c5cd0c25bbf0c59de03f690a6845c9f4f2f4a6f0fb556e0e8db612d23066cf9d5563f9e7550fd78d2bf8c0fdd3fb31999f2f6f5ad0b2ddbca92635b5325bdb76ab6f78ac1ccdf967c51d2f83139294590b04c193968f0036326caa49d61db440770bcf31f7c5629a2acf37d9c308ca41997c137a222329f153e696a02d514eadd1ccbf9db83aa64ad4b7e388cc718313d9dc125fa2516135abc470acc89931c1ee765531346097bd530d3ca31b50a0fcf54f7c54cc860a9f140e688c552ecfca55bbdc0e22cb1bc6f68d5f3a18acb2861979b535627e4aea2640421cb56e88ad17a3023fcf2abd8efc5bf5a7a91c02b02c7d0cefe86fc917876b81888485c04275c438e865054e1bc79174024d309280fe787ac22ac7de39b4eda8add38e0de48422cb981866397a41c00e3b0766f016e09357cc3e4ec197c2c6766dad5c4c417274a6c5702ed64c1b3cf70942ff25b0802da99737c72c19326d258fa1101f751e862b8bb9c554c463820bf488cc24feac70b047f26ff80d831a3175f2c8aea40f66ae898812ee3ae4d1971571a5989ab2eda5508172ca01bffd276e451d33db3a53a1dab81fd9cf0405638c98ce697bdd9f073e3c1a0cbf3193b19263b040c3c9e6e92780178b2588a12f336b618a601dead7458a0cf9b079ecfc16829e548669627af58a93524f268305b13713c3b0056848614a70c5a471ad85266313bc6a41a636ed15d086569c20139f61fda6c35ec4ece94e48a7698ccb456a649da8b89cb8c25c6a9f3f6e0c5c2f3f2ce32b9e65111c5a61b0e6d7a96bd6669eeda7f002c8f65105d2c89764d27552f59723952b8af52ac77356c72cdcc3b075fd33fb8d8c4365980d650c589b779dc56b150269c58726e127c3e27a76543c6b58598a52a6581547c9ed13f65408056124623dd36eb17f3c65df87612a86c9714d2c43fa2b99b21e8aea8f1eef704b00e9763eeffbe74859b8461c2bae4f39aa4d1ed0779cc10f039ea4377e797d74ab2df1ea4fed610b4aaa18ef1c2f515c94aa0f6c3ccd789f802057de786d75b88805a23e627bc22d56ebd90e03a73fce5a68e5b2365a997cd1e23e28a1ae50a0771400b1a9be0af373206faa5504ac68be21b7fc7f2ac31fa45a1f9de6ec056e172723c23241fe24daa58955ae4e68e4ada59043417750eb752f3fe3239f138f72a19dd47d0fb8eec0defa5002f65b09e8c5d9996954636a20058f2e58a0df00f1187e3263f85e7e2d663729e9f1495b2bd34f9935355d9f8d1a9215a288a16ba35b6f4a1dba6296540961afea7cc1b561bd75d4a28a3431ae02a1eac46823c9b8a6fdac61a3c2d1893aa42cfc446f115b205e94c50b87a10dbe7cb99e3792d7f5cf4bbb5137e4b37f0b9c3741bfef704d49d20140ee66e92e28e50db0b334c2f23d34c259d22dfa124a2207db9fdbcad5bbd0dc8204568a3d30badd036733c89cb3e4b3413d98d586dea16fbc6340c450b7e7da9892d58b1b0e55e85b844817da4891c5d756704d1c9e1a998ae2f287fc7bad9d34bd4778b82cf4afe8a3ffaff8615595ab89d8ab5c4ac3a180b8c586a32f0bef7ab3fcdebf572586701685bcf78f89386e563da1a2d76f1bf9ae1b43ae99c10aeb2654b90d6cc443761930663e4771b4ba518fbf4073e23b8178ef40494b5b6213041b78792ca0d6825fdfc74c8552a15fa7b4fba504d9cec7981899b6fc927b38b5195adefe46fcb863e2348c7022c85a4c2268c8d1a0f73ff2640e205f59ae51a95d2c8d5c2f929b59c55094af77b570026da34efdb04628377cb6101e713efde3943c74fcc940e74bdadca45bfac0c8794cb032834cd67b52a0de15ab946c50024c9c643b162fd939e7ebf252a227b8099e202533ed6207ace0dcb1e9a4ce934fe6007d647c92f6f09b7a9d9eaa0008f6daae64813af85718724a18ee138be04506aa8d9a63755fe1593c9ab3e0a5ad75a77fff1ef18a9b2c8f33eebf8bf8532165d20bc2655607ff0c226ad26bf35cd94b2f6e86c27281eefdde1bce8ab32c1b3d04de705715da950851f1d72fc871cbe2dc47637ca3cced59c88d262ebc05c301e5013423327f96a909b2352f0673972336c1162830fe01bf0e07dc1957fda7dbbf835ae7437fe15e17598f996758b44fb135ff0c0a1f5d0f270e1a841a4fa4440ba5f0d884ae5c01355d0dcae2d2c0b51d771919c595566d35fd02e0bfcc501a5a6ebf4cdb0e1e3aa69d5156e59444c5bb97f06267dfc8aa2535d453f3161ef2cc590a319e254c6fe319e6bbfe90b149f84aaf7c4822c2bb71367e6b3c045f7117df1f6e4e6f8ad11f0dfda154c9891a8d893efa2fe8a0a5a9f4828e89488300c27e55074d1ed334597c7075634ed37e8270165bf038fa7708ae086f90a09442035c5336ab26818ef63f7154363cf4b6994fa221d7ce902bab80fdc6aa7c7e9aa2237ce9fcca42aa5158165e8d123364b4bc60401ce08aea57a373300a3cc84030a395599e4a2e77ed557980c3b97d672c23659678cc5f319762b4f1ac7b642cb8dde6c58e69ef245bac50cbe3c1f49fe9108fbf901cb6f5b821ff88f397fc2b841bbe15d229778af9a62fcb4afbfec8e32c0fa68ccd721c5af5f6ffa89ef1615317c7930db195294ed4ad89c3f583b241ba094069c592027ff18b15a9d224fdcef513f063840d9f6fdd313f33b5510fb39b1be5d9a11058f6ba9259f16706157ec89f5ed359c08c980c96aa3682d6a325f65bc70ee9ffbfe643214f18a334d3fbf6ecb942f0d4751497481878978b32b694875b8db3a8db97d442fd447b33af4423b31771b917dcb65f61a3641023ee99b11507851959868900d41eb1be8815607721c6480bfcbd452a1f768ce387f7beb76607db8d37fc83bbe03caceee67235ac7a7b611dc4a1237e828d63686e40741c5a8a826bc3b7a181cb1cc1a6c3d9a11d33b23f36c5c0a7fd50f60c8acb32ec9a33ef13d3d87592c5cf87c8e2d7be4c3e1353266e1b8975ea8f5e586cdea2a74213c1a26ac0bc376958c7c978399f6832829dfeb5d6d76f8dcc7df87a974274e81ed985b9f1339c72bde10b83cfab7e72e7f6f3e7dbb6f6480187fe362cc1bd7f3af72eabf3f5c26c5089c0457592fc2037e9ec5b59d2c9dcff1fdfd9fd3d2eab6324dc15ac55bb82f2842cc8189301c5f2d5cb1894b7d98575a7c6cd85c128732dd2f0226ec1c138ddeaebe710f65ceeb86216585db2f30986376d953d0a9586d3120f4282f55b5d99a02721358b4411fe113e6d0c3e3bf5101679a1957fc1d7ce524a0139703211352cf9d2030063e0f64754d506150fc7d0582ef51b7886016d5092ba111d741b2d5b32c4db0bd671f3d239324bc5cb0c569331364a03d1b1d49c1f75afb2fc2adc3bd9cc9987708e07a23b918f2c6898254c89ce1822afe7f222aab5ab9f095f16c015e4a61b6e330de102fd34eae9cc4df8ecfa5cb2d78e2964c465f426aced47ba16efa77fd9751238b8b3c542da6fe6248f4407c75cf57091bf7e5dd9d454f2a8f204d7bc32429bd6b8d9b51c22ecb236397dd7dc3e2dbbdc76db618b627bdf770edce30489c7c2013cc0bef6ce67e3047dc28a46fca8a5c75c160843f61448aeea9269290172302602d3b7978ca3660237a263ec2fdb6d8bd4d738a4128ef26481bd50d9a374ff401b61ddefdfa3c4994d2db09cc188e88b60be5b9f25e3d69206a71a7befa7d7b56c8f6766378381ba3ebabc99c34c89df5f613edf81ab49037227b88fa05c3d35a9e426c3217ea84fa4480d0d93cb189a1dff4920ae23a4e6e34d97b94fd3aa21596076438c5a55135ae12782b5921211c4eb62d7b0a94406ebc4a898f0fad14fd2efff7a113c4b9026f5825ec1ed46b49389700cac3337bf9cc8d37ff9df936f578655bd5790c2fb1389574ca4411c1180ba1d418ed0ddbdba0929564f1614bfc4428267d37403cdbd2b9ea083b4bef0ad30c671532ef1a359f365867734928212a5f8d210e5342888e7df97c474a71c3bbf29731a8f2792da503575b222a13894799f12299826c932177e794cc147ff727a23af28ad8ea0806e241d7b79fb0ed3be615ea8bc1b442743b1a002b2c9d6f7ef74b2b3d133b8eb644600abb16db83c5baf7ad491b1b2a507977a677ebe7736d35458e456aba211a74870fe9a127d6f241448f88e8bd3dbfec62dcabd243cdb7a8dfa6ea9a587e825ecfe04b9744b5410a13dd4073c854d35c88a5ac586f0c58292eb94ed68256cb07cf2dcd98f724612a5d894c17fc17da4fb8357ec023e2503155f0c7e60e8efb9a4b57fa2321f0ec595070dccd9bab806bc00d4788ad915b8792f551b3e2abd64ab682595ed77b4727390d1494370f761bab28bf7d64200708fcd27138e263d50a401da604b5ff5e0cb4c5fdcb55110b22c63936dff280405f4f19e090f3596152c08311ed274b02170f2071bb1fc730aa510b611414724ebf25762e15b05d6907cb32242e8ccaabf87015629d37b5b4f5065dc193d329f64ffb1f9c706436ff5e14aff56ced9d914c333fcb8ffe8dfd2340a09e715732bcab33a2cdf10928af67aa5d5926290cc42d0b58df063e43294cfa04a8e88c3bc82e032d91d1aaeacf5c568e6880b30e4ec45b46a4d2d0c6d79ce10cdf5639d718f43540c49a8530f155e3b57021d5baeab4691a96191bbca074c6a5791b406fa619d55b051c3c58f60afad0bb5b86db915228a5b90bb55103fb36d457c4a80f1247f1fc418f8e049dad1b4921f672dd8562dd76dfa0ea1bf84ad4842f671dc0a13225a2d2d8a7f6a4a086b89b82db36a867dd87591d6cc6124c5afbcf00f8fa57692c410f8cf1bffd8812c4558a363fd1dbe134ca719d3edb6284127c95f148bd422a1808dbcbdcb90c502988d41d1ac2e87294a2080385aee7f3e1c474631540cb3fbd18b697056f3efbf83f4e5f9218d195be6481337d63ca68d689f696a7040f59496b1a95f5878a57b51a846b52f6bfdc4d49adfcfb644702ce7a50f320449453a0b05ef4ea3a5eabcbad062d2b185d83bd2881d8451c53318e88b4ee8d62c95b54b5ee979e1a7055113cbed0817abaf716cecd7010b47fafa6292b68de05c00c767c3b618158d329036d4fe9093a6fd13e133da7695355e39a0944d8c20fda53a55ded2fe6b643a1cea85157091af1a301706e84286165aece41491337bd3b5c2e3a3bc84210c8cfb45aa67b3f22917741d6479b67daa9b0d141b9aa3d47ceae526dadd472481b802a1732944f55720827e45eedd6fe804587097a555d7a12015325956265d76e6b04ceebc0652c4febb079387dc7b0c04a5d0d53c0ad523e48c4d414df9c842ffc8c0416c142a07425bce6a2cf49ea8ee81849eeae62a2f1df78bdaee3fb5978f6f73a67ee856c77d31e30afebf20e7bfe493c0439e9d74cff50af31aa87adc7b18bb5b1c0b2ba6e213a5bf432c1ea1574fefac8fa99b07ee789e779b7406c0b0d1826dc3ab6a36006b0494c02381d3adf085aa72601fd6fb095d8996e98bf370a53bbdfffc27778f4e9bf78aad05b7ce91beae8c1fe23ef4ca91eacc67a335b356a2ac725a58ae6e1153af08ccc3d479d267902b68e87148db8d1644b3815f5f2d2c7b4972f9f25458df358c9", @ANYRES64=r1, @ANYRES64=r1, @ANYRES16, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRESDEC=r12, @ANYRES16, @ANYRESOCT=0x0, @ANYRESHEX=0x0, @ANYBLOB="1f84e0eaeb68003475534cdefd92eb38882c98432dd209e0c423ba7f44324a2e2c91168c5bc57ad30196797adbce523eee26a0614466daf791b680d1e1907c57b23f7a8240c70a8509d5af5b6e0ff6e1ccd7d5d2f20e53160e4174180b5aec3b0bc076a7095137a3d2f56202095250bee0c2fc988de09d3708f3221c86fb9b945c2b6aa8148c31b29f4d57d439ac220c9b"], @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYPTR, @ANYPTR64]], @ANYRES32=r10], @ANYRESOCT=r11], @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESOCT=r3], @ANYPTR64, @ANYRES64=r5, @ANYRES32=0x0, @ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r0]], 0x3}}, 0x0) 12:54:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 203.819827] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:23 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x10400, 0x16) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0xa, 0x800, 0x4, 0x6c00, r4}) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f00000000c0)={0x5, 0x200, 0x6, 0x20, r7}, &(0x7f0000000100)=0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000002060501ff0000fffdffff2ef6ff04610c000100060000007d0a01010c0002"], 0x23}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPOEIOCDFWD(r9, 0xb101, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r8, 0x3) 12:54:24 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(0x0, &(0x7f0000000380)={'syz', 0x0, 0xff}, 0x0, r1) r2 = request_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000480)='/dev/fuse\x00', r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000580)="10463fa71e60fb32ed4781ccea9d53407f0f35e4a08512ce3247e21509bc3362217c768850ebbd20f663df912ee2cc0bf4bd2e32aaaf8a4d8c6ffa85240b0bec655e76da535ac558bbf77d23f6f7ac4256343dda6d7f9768e3e5df8798cb7b05e178215a226ddf7183df8b02d5d6ebbca2966b80fe", 0x75, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r4, r3}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r5 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(0x0, &(0x7f0000000380)={'syz', 0x0, 0xff}, 0x0, r5) r6 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="c47e2510c2a01eb3", 0x8, r5) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r4, r6}, &(0x7f0000000640)=""/166, 0xa6, &(0x7f0000000840)={&(0x7f0000000700)={'wp512-generic\x00'}, &(0x7f0000000740)="b40ca590a9ffb1c124e377a0ce7a94083b3a92f51a58021450525525eb5516a9d26e0f0b89b8d7020385599d285cb0ce8f38a57366ca91f4ea6b235dcad2da509febdb0cf7db6a16f9d524c0bd9670dc973befeae672960d7a959fd739f3cf0ca2f8da8386a7cab16676cd0d6159725c5cd54f9df95e429ba18c8f5fe241ac196ff0ccb8ca3e96731bfef6fb51e0942233ed952acefe5aa8a0c48c20833826a7a4788085492e9fab0222dd2d41139e473ced8919adc2b7386862f01f28a7e112c6c16c27da4f584bb248f17d0870697bf15b6dbe426a2736c106d3864977e01b07675a4f77d639fb", 0xe8}) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000240)=0x400) setgid(r8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fcntl$dupfd(r7, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000100), 0x4) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$FUSE_INIT(r7, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fchownat(r9, &(0x7f0000000000)='./file0//ile0\x00', 0x0, 0x0, 0x0) r10 = syz_open_dev$mice(0x0, 0x0, 0x100) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000001c0)={0x283, 0x5, 0x0, {0x0, 0x0, 0x0, 0xfffffffa}}, 0xfffffffffffffd2a) ioctl$PPPIOCGUNIT(r10, 0x80047456, &(0x7f0000000040)) dup(0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 12:54:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 204.006304] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 204.017103] audit: type=1400 audit(1572008064.082:48): avc: denied { create } for pid=8339 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 12:54:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b00") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 204.150406] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 204.160371] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 204.173092] audit: type=1400 audit(1572008064.232:49): avc: denied { write } for pid=8339 comm="syz-executor.3" path="socket:[30126]" dev="sockfs" ino=30126 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 12:54:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b00") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 204.348659] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:24 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(0x0, &(0x7f0000000380)={'syz', 0x0, 0xff}, 0x0, r1) r2 = request_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000480)='/dev/fuse\x00', r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000580)="10463fa71e60fb32ed4781ccea9d53407f0f35e4a08512ce3247e21509bc3362217c768850ebbd20f663df912ee2cc0bf4bd2e32aaaf8a4d8c6ffa85240b0bec655e76da535ac558bbf77d23f6f7ac4256343dda6d7f9768e3e5df8798cb7b05e178215a226ddf7183df8b02d5d6ebbca2966b80fe", 0x75, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r4, r3}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r5 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(0x0, &(0x7f0000000380)={'syz', 0x0, 0xff}, 0x0, r5) r6 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="c47e2510c2a01eb3", 0x8, r5) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r4, r6}, &(0x7f0000000640)=""/166, 0xa6, &(0x7f0000000840)={&(0x7f0000000700)={'wp512-generic\x00'}, &(0x7f0000000740)="b40ca590a9ffb1c124e377a0ce7a94083b3a92f51a58021450525525eb5516a9d26e0f0b89b8d7020385599d285cb0ce8f38a57366ca91f4ea6b235dcad2da509febdb0cf7db6a16f9d524c0bd9670dc973befeae672960d7a959fd739f3cf0ca2f8da8386a7cab16676cd0d6159725c5cd54f9df95e429ba18c8f5fe241ac196ff0ccb8ca3e96731bfef6fb51e0942233ed952acefe5aa8a0c48c20833826a7a4788085492e9fab0222dd2d41139e473ced8919adc2b7386862f01f28a7e112c6c16c27da4f584bb248f17d0870697bf15b6dbe426a2736c106d3864977e01b07675a4f77d639fb", 0xe8}) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000240)=0x400) setgid(r8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fcntl$dupfd(r7, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000100), 0x4) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$FUSE_INIT(r7, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fchownat(r9, &(0x7f0000000000)='./file0//ile0\x00', 0x0, 0x0, 0x0) r10 = syz_open_dev$mice(0x0, 0x0, 0x100) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000001c0)={0x283, 0x5, 0x0, {0x0, 0x0, 0x0, 0xfffffffa}}, 0xfffffffffffffd2a) ioctl$PPPIOCGUNIT(r10, 0x80047456, &(0x7f0000000040)) dup(0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 12:54:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b00") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:24 executing program 5: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x1d7) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x801, 0x84) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000740)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @empty}, 0x4, 0x0, 0x1, 0x2}}, 0x80, &(0x7f0000000680)=[{&(0x7f00000002c0)="6ed2ba888ce495a707d05e255605f286cf9010afaf6b4246adc40c81213ebf962e27c72586ed0b59a2c3f625d11cd7f82b5054288fccae4da44d304f4c8fc044145ef8793df68657ff3380ce4461bb2c085a915c0f10ba08ebf05e37a18ca9499a50253f7443834a799ddd6c3fadec0df2af646bcf339da52b626e2aef3478490875be1adaa7966bd4d35fe873da566a712463f8c8c459edef76f3d0f332c26df325685f0053f6d6578e5f63588234422bf7510d1edbe358e0e4a2b0edded4f57f4f47cb9d57204c363cfe9389909327008fed9249bb14a2c2916d0a81b5dfe7750af850e2ecd4d5af", 0xe9}, {&(0x7f00000003c0)="3dfb103f3b54770b759c69a1cbf70f1825689b6b34f7ca4f45098823f443e90191815cd3970186f998ab91d574da876eedf8f19ebe539d9a9d1d3e56211d94aeb7b26fca9ebbab570ccbde340e16fbaa62a6008a426df6e101ee97ed74f480ab2ab0da", 0x63}, {&(0x7f0000000440)="c80a5a4106526b96ff06fd5e7cf289c4de25fe6e11d916c43c3b4cd71536f7bdb8628d7797b0fd28c1766a71db4b7464c09bc5a824bb4c928b878aa21dc8039eb038633ad6adc26d067dabe131e1699a1f098f37dd80111bf342b6dc7a408dee8720fd62e8d392f81d0aa793b9344a3f138e18", 0x73}, {&(0x7f0000000080)="cd1e9e9079dadc920e7131a2ab869ad753dc926060b424159b431c76b356e505047c3d7e0b12936703d5", 0x2a}, {&(0x7f00000004c0)="07c524dd7270c629650dfb76739b8cd49d2a66c0abba4fa09d364159d76d0113bc66149c45c990b57ac4d60616fae1aa3f2d8ddcdd474675a67d22e25b30d918b29aebb2d1a9c4e6599345528e0c5f8dcb9178db504bad1136e4c2c814b90591d7", 0x61}, {&(0x7f0000000140)="cfb4b61f", 0x4}, {&(0x7f0000000540)="a162fc54eef0e80e22c9bb560cefe54c8299748d9041b5be9d23455d7a0c6d435ebee23f4f99d13974f34e9392426a079cc98c4f6774f6c9097de2d7174ae63126fc18ee2ee992d6", 0x48}, {&(0x7f00000001c0)="4adf670e393bfaf62f1a493fc9716f5295ce5f251591b22dfb6480ad617070645cb794a1ace4afaae3c1b570bc8d3c488ec4f124e408cd8b0b4942", 0x3b}, {&(0x7f00000005c0)="b2c5053bb61f9539ff3be43b0d43d47bf84c31b1ce80868d6c34d68e58de1cb33dd5c8495da839f3c781ba67b7f60b4a635ca82d7592b591a1a30a5834089c509ad9522148a2c466f4a9439cbee2f01e49e8c9fb558ef22ddbac12c5ed884a95df35e7c0f698ce99ca9982fbf76c5c6feb697115aca219b99263fe0e1afa72c0edd045377b983249285b94ff80c55ce9aa38a84efe8ea39f203311abcf97d6dc32d1fc0fead60cff0a16ee", 0xab}], 0x9}, 0x4048000) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1, 0x0, 0x0, 0x9000004}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) r5 = msgget$private(0x0, 0x1) msgctl$IPC_STAT(r5, 0x2, &(0x7f00000002c0)=""/106) msgsnd(r5, &(0x7f0000000840)={0x2, "f91d20aaee8c42f3f5505e081b1cfb8ac5b410f470bc411b8fc3f61713a5aa6f50c0c67ef0c76dfd991d5b38d5450d5d33d2b2be66c89a39ba1c2f0a1d9a466fe6e6f930763d983ea3a1aebc6a808b35e85ca4363393e33303e71fa8573e56a26cffd865b5ba38c4f4b5d3a77aedeb590d32afd436887b8da19099d7450be5b79aa868e1fb84f868285de830d4512209540705dc708fb1d51cae4af12fd710c6db108bfcfef0eeb23179f7385bbcde7220edfedb46611a7b31dcd95249f7d0508b3a785688b760a995c4738a33e0d2097c9e0ee6d1d8c7fe6cf2de6d324cd45c96"}, 0xe9, 0x800) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000780)={0x8, 0x4, 0x8001, 0x5, r4}, &(0x7f00000007c0)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000800)={r6, 0x7}, 0x8) 12:54:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod(&(0x7f0000000540)='./file0\x00', 0x1041, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8f9f42ee81f13862, 0x0) clone(0x802102201fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'veth1Tto_bond\x00', 0x3802}) close(r1) creat(&(0x7f0000000140)='./file0\x00', 0x0) 12:54:24 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2c640, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000040)={0x2, r4}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./file0\x00', 0x8, 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3ff, @mcast1, 0x4}, {0xa, 0x4e21, 0x1, @local, 0x21d48482}, r6, 0x1}}, 0x48) socket$inet(0x2, 0x0, 0x84) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000140)={0x2, 0x4e21, @empty}, 0xffffff0b) r7 = socket(0x2, 0x800, 0x6) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f00000000c0)) splice(r0, 0x0, r2, 0x0, 0x1000d, 0x0) 12:54:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 204.645250] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:54:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in=@local}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) userfaultfd(0x40800) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:54:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:24 executing program 4: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x8004808000080003, 0x3) r1 = dup2(0xffffffffffffffff, r0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x1}, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080), 0x1, 0x0, 0x0, 0xc5e49a4989420d5}, 0xc004) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, 0x0, &(0x7f0000000540)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x0) write$evdev(r2, &(0x7f0000000100)=[{{0x0, 0x7530}, 0x0, 0x63, 0x2}], 0x30) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f00000002c0)=""/112) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000180)=ANY=[@ANYBLOB="0104000000000000072000000000ffffffff00"/31], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0x3) r5 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffc, 0x4, 0x7f, 0x2, 0x0, 0x0, 0x200, 0x81, 0x0, 0x7, 0x0, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, 0x0, &(0x7f0000000640)) preadv(r3, &(0x7f00000013c0), 0x1e3, 0x0) write$FUSE_INIT(r3, &(0x7f0000000580)={0x50, 0xffffffffffffffda, 0x7, {0x7, 0x1f, 0x7f, 0x40080, 0x0, 0x4, 0x1, 0x20}}, 0x50) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000000000000000000080008000c000000", 0x24) ioctl$PPPIOCGMRU(r7, 0x80047453, &(0x7f0000000280)) 12:54:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 205.015776] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 12:54:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:54:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in=@local}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) userfaultfd(0x40800) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:54:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 205.252478] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 12:54:25 executing program 5: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x8004808000080003, 0x3) r1 = dup2(0xffffffffffffffff, r0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x1}, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080), 0x1, 0x0, 0x0, 0xc5e49a4989420d5}, 0xc004) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, 0x0, &(0x7f0000000540)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x0) write$evdev(r2, &(0x7f0000000100)=[{{0x0, 0x7530}, 0x0, 0x63, 0x2}], 0x30) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f00000002c0)=""/112) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000180)=ANY=[@ANYBLOB="0104000000000000072000000000ffffffff00"/31], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0x3) r5 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffc, 0x4, 0x7f, 0x2, 0x0, 0x0, 0x200, 0x81, 0x0, 0x7, 0x0, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, 0x0, &(0x7f0000000640)) preadv(r3, &(0x7f00000013c0), 0x1e3, 0x0) write$FUSE_INIT(r3, &(0x7f0000000580)={0x50, 0xffffffffffffffda, 0x7, {0x7, 0x1f, 0x7f, 0x40080, 0x0, 0x4, 0x1, 0x20}}, 0x50) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000000000000000000080008000c000000", 0x24) ioctl$PPPIOCGMRU(r7, 0x80047453, &(0x7f0000000280)) 12:54:25 executing program 4: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x8004808000080003, 0x3) r1 = dup2(0xffffffffffffffff, r0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x1}, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080), 0x1, 0x0, 0x0, 0xc5e49a4989420d5}, 0xc004) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, 0x0, &(0x7f0000000540)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x0) write$evdev(r2, &(0x7f0000000100)=[{{0x0, 0x7530}, 0x0, 0x63, 0x2}], 0x30) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f00000002c0)=""/112) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000180)=ANY=[@ANYBLOB="0104000000000000072000000000ffffffff00"/31], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0x3) r5 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffc, 0x4, 0x7f, 0x2, 0x0, 0x0, 0x200, 0x81, 0x0, 0x7, 0x0, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, 0x0, &(0x7f0000000640)) preadv(r3, &(0x7f00000013c0), 0x1e3, 0x0) write$FUSE_INIT(r3, &(0x7f0000000580)={0x50, 0xffffffffffffffda, 0x7, {0x7, 0x1f, 0x7f, 0x40080, 0x0, 0x4, 0x1, 0x20}}, 0x50) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000000000000000000080008000c000000", 0x24) ioctl$PPPIOCGMRU(r7, 0x80047453, &(0x7f0000000280)) 12:54:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) 12:54:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in=@local}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) userfaultfd(0x40800) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:54:25 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000000)={r4, 0x7539}, 0x8) close(r1) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r5 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r5, 0x0, 0x8000fffffffe) 12:54:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) sendfile(r2, r0, 0x0, 0xc0000008000000b) open(0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) ioctl$EVIOCGSND(r3, 0x8040451a, &(0x7f0000000180)=""/4096) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) r4 = open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) syz_open_dev$sndpcmp(&(0x7f0000001180)='/dev/snd/pcmC#D#p\x00', 0x8, 0x20800) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) dup2(r4, r6) 12:54:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) 12:54:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) exit(0x80000000) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0xda, 0x8, 0x7, 0x5, 0x12, 0x7a, 0xfa, 0x5, 0x3e2ba102, 0x4, 0x4, 0x2d}) ioctl$KDADDIO(r0, 0x400455c8, 0x1) [ 205.731900] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 12:54:25 executing program 3: ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000900)={0x1, "1d2babd1078017162fcecd31a3ffa9f706aa42bd654a997084dce574fa7a639d", 0x0, 0x1, 0x10001, 0x0, 0xb}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0xa}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r7}]]}}}]}, 0x40}}, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f00000008c0)={r7, 0x1, 0x6, @remote}, 0x7) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x4, 0x400, 0x8000, 0x204, 0x1, 0x2, [], 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5207, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000880)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x7}}, 0x18) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000300), 0x0, 0x401}, {&(0x7f0000000380)="699127f5c06f141e9f7db613f1e23cfc37b00027000c22dfbf25563313e9ed336a621fb8509858df3714e045a20bdb8ca05ddc8778337aec7420536e4e7891a01b75de475d321bc63283c53ee579fa5e1b84aa9874bc3604956569ad7e1dd372caf0a36dcbfcc58f27481776f1f2bb", 0x6f}, {&(0x7f0000000280)="c737c38ad0b03c8be601ed6333e0338e2fa4bc8d32003ccc488b138dc66db60dbaf1da7ff337fc", 0x27}, {&(0x7f0000000480)="43dc034622aa5189b922c3", 0xb, 0x7fffffff}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB, @ANYBLOB="2c7375626a5f726f6c653d76666174002c736d61636b6673666c6f6f723d272a2f70726f63656d306e6f6465765b2b776c616e302d73656c6674727573746564125b2c7569", @ANYRESDEC=0x0, @ANYBLOB="2c00b05e5532631b2849f2e2ec32a298f755ac7feed4db20a1e267e9291083abb09ed1f12175548ef4deb7bb1c6f8e3f92afeab6e667c8eba93651c3edec82de1f14f07069eca412659ae6d8b51deb62b926bf6c28aad1fd7bed1b964ff2bb"]) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5207, 0x0) 12:54:25 executing program 4: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$FUSE_LSEEK(r3, &(0x7f0000000140)={0x18}, 0x18) r4 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7fffffff800, 0x46b6f3d17645ffbb) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x0, 0x4) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) setsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f00000002c0)="99dc094f40a861b353764a4faa35e3d6765a26906b892b5f83d00972d3419917bb0e62236f41409229a37a5e9aaf5e9209f285fb1a5d99a1c712ff0fa9e88f000000af", 0x43) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) 12:54:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) 12:54:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 206.006472] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 12:54:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 206.215833] Bluetooth: Error in BCSP hdr checksum 12:54:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 12:54:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 12:54:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 12:54:26 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgid(0x0) ptrace$cont(0xffffffffffffffff, r2, 0x1, 0x335) rt_tgsigqueueinfo(r2, 0x0, 0x22, &(0x7f0000000000)={0x32, 0x2b5, 0x4}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$UI_DEV_DESTROY(r1, 0x5502) preadv(r0, &(0x7f0000000700), 0x31f, 0x0) [ 206.475244] Bluetooth: Error in BCSP hdr checksum 12:54:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 12:54:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) [ 206.761240] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 208.013776] Bluetooth: hci0: command 0x1003 tx timeout [ 208.020787] Bluetooth: hci0: sending frame failed (-49) [ 210.093429] Bluetooth: hci0: command 0x1001 tx timeout [ 210.098942] Bluetooth: hci0: sending frame failed (-49) [ 212.173086] Bluetooth: hci0: command 0x1009 tx timeout [ 216.417722] ================================================================== [ 216.425354] BUG: KASAN: use-after-free in kfree_skb+0x38/0x390 [ 216.431472] Read of size 4 at addr ffff8880a1e7b9a4 by task syz-executor.5/8465 [ 216.438975] [ 216.440601] CPU: 0 PID: 8465 Comm: syz-executor.5 Not tainted 4.19.80 #0 [ 216.447885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.457404] Call Trace: [ 216.460012] dump_stack+0x172/0x1f0 [ 216.463645] ? kfree_skb+0x38/0x390 [ 216.467277] print_address_description.cold+0x7c/0x20d [ 216.472989] ? kfree_skb+0x38/0x390 [ 216.476617] kasan_report.cold+0x8c/0x2ba [ 216.480771] check_memory_region+0x123/0x190 [ 216.485170] kasan_check_read+0x11/0x20 [ 216.489158] kfree_skb+0x38/0x390 [ 216.492809] bcsp_close+0xc7/0x130 [ 216.496356] hci_uart_tty_close+0x1ea/0x250 [ 216.500684] ? hci_uart_close+0x50/0x50 [ 216.504737] tty_ldisc_close.isra.0+0xaf/0xe0 [ 216.509358] tty_ldisc_kill+0x4b/0xc0 [ 216.513165] tty_ldisc_release+0xc6/0x280 [ 216.517322] tty_release_struct+0x1b/0x50 [ 216.521466] tty_release+0xbcb/0xe90 [ 216.525169] ? put_tty_driver+0x20/0x20 [ 216.529227] __fput+0x2dd/0x8b0 [ 216.532517] ____fput+0x16/0x20 [ 216.535799] task_work_run+0x145/0x1c0 [ 216.539680] exit_to_usermode_loop+0x273/0x2c0 [ 216.544354] do_syscall_64+0x53d/0x620 [ 216.548252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.553429] RIP: 0033:0x413ad1 [ 216.556625] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 216.575601] RSP: 002b:00007fff56d79800 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 216.583296] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413ad1 [ 216.590551] RDX: 0000001b30a20000 RSI: 0000000000000a6b RDI: 0000000000000003 [ 216.597805] RBP: 0000000000000001 R08: 00000000d0bf8a6b R09: 00000000d0bf8a6f [ 216.605064] R10: 00007fff56d798e0 R11: 0000000000000293 R12: 000000000075c9a0 [ 216.612321] R13: 000000000075c9a0 R14: 0000000000760518 R15: 000000000075c07c [ 216.619730] [ 216.621543] Allocated by task 2816: [ 216.625188] save_stack+0x45/0xd0 [ 216.628626] kasan_kmalloc+0xce/0xf0 [ 216.632322] kasan_slab_alloc+0xf/0x20 [ 216.636194] kmem_cache_alloc_node+0x144/0x710 [ 216.640762] __alloc_skb+0xd5/0x5f0 [ 216.644383] bcsp_recv+0x8c7/0x13a0 [ 216.647992] hci_uart_tty_receive+0x225/0x530 [ 216.652488] tty_ldisc_receive_buf+0x15f/0x1c0 [ 216.657058] tty_port_default_receive_buf+0x7d/0xb0 [ 216.662060] flush_to_ldisc+0x222/0x390 [ 216.666023] process_one_work+0x989/0x1750 [ 216.670447] worker_thread+0x98/0xe40 [ 216.674232] kthread+0x354/0x420 [ 216.677593] ret_from_fork+0x24/0x30 [ 216.681286] [ 216.682916] Freed by task 293: [ 216.686096] save_stack+0x45/0xd0 [ 216.689623] __kasan_slab_free+0x102/0x150 [ 216.693845] kasan_slab_free+0xe/0x10 [ 216.697626] kmem_cache_free+0x86/0x260 [ 216.701586] kfree_skbmem+0xcb/0x150 [ 216.705294] kfree_skb+0xf0/0x390 [ 216.708747] bcsp_recv+0x2d8/0x13a0 [ 216.712447] hci_uart_tty_receive+0x225/0x530 [ 216.716931] tty_ldisc_receive_buf+0x15f/0x1c0 [ 216.721499] tty_port_default_receive_buf+0x7d/0xb0 [ 216.726503] flush_to_ldisc+0x222/0x390 [ 216.730462] process_one_work+0x989/0x1750 [ 216.734682] worker_thread+0x98/0xe40 [ 216.738476] kthread+0x354/0x420 [ 216.741828] ret_from_fork+0x24/0x30 [ 216.745535] [ 216.747145] The buggy address belongs to the object at ffff8880a1e7b8c0 [ 216.747145] which belongs to the cache skbuff_head_cache of size 232 [ 216.760329] The buggy address is located 228 bytes inside of [ 216.760329] 232-byte region [ffff8880a1e7b8c0, ffff8880a1e7b9a8) [ 216.772459] The buggy address belongs to the page: [ 216.777385] page:ffffea0002879ec0 count:1 mapcount:0 mapping:ffff8880aa347ac0 index:0xffff8880a1e7b140 [ 216.786836] flags: 0x1fffc0000000100(slab) [ 216.791059] raw: 01fffc0000000100 ffffea0002847788 ffffea0002093cc8 ffff8880aa347ac0 [ 216.798940] raw: ffff8880a1e7b140 ffff8880a1e7b000 0000000100000002 0000000000000000 [ 216.806865] page dumped because: kasan: bad access detected [ 216.812556] [ 216.814165] Memory state around the buggy address: [ 216.819088] ffff8880a1e7b880: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 216.826604] ffff8880a1e7b900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 216.833970] >ffff8880a1e7b980: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 216.841327] ^ [ 216.845730] ffff8880a1e7ba00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 216.853302] ffff8880a1e7ba80: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 216.860860] ================================================================== [ 216.868206] Disabling lock debugging due to kernel taint [ 216.874822] Kernel panic - not syncing: panic_on_warn set ... [ 216.874822] [ 216.882221] CPU: 0 PID: 8465 Comm: syz-executor.5 Tainted: G B 4.19.80 #0 [ 216.890459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.899812] Call Trace: [ 216.902391] dump_stack+0x172/0x1f0 [ 216.906009] ? kfree_skb+0x38/0x390 [ 216.909635] panic+0x26a/0x50e [ 216.912811] ? __warn_printk+0xf3/0xf3 [ 216.917048] ? kfree_skb+0x38/0x390 [ 216.920670] ? preempt_schedule+0x4b/0x60 [ 216.924806] ? ___preempt_schedule+0x16/0x18 [ 216.929215] ? trace_hardirqs_on+0x5e/0x220 [ 216.933521] ? kfree_skb+0x38/0x390 [ 216.937133] kasan_end_report+0x47/0x4f [ 216.941089] kasan_report.cold+0xa9/0x2ba [ 216.945221] check_memory_region+0x123/0x190 [ 216.949612] kasan_check_read+0x11/0x20 [ 216.953569] kfree_skb+0x38/0x390 [ 216.957008] bcsp_close+0xc7/0x130 [ 216.960534] hci_uart_tty_close+0x1ea/0x250 [ 216.964838] ? hci_uart_close+0x50/0x50 [ 216.968816] tty_ldisc_close.isra.0+0xaf/0xe0 [ 216.973305] tty_ldisc_kill+0x4b/0xc0 [ 216.977177] tty_ldisc_release+0xc6/0x280 [ 216.981309] tty_release_struct+0x1b/0x50 [ 216.985441] tty_release+0xbcb/0xe90 [ 216.989148] ? put_tty_driver+0x20/0x20 [ 216.993256] __fput+0x2dd/0x8b0 [ 216.996632] ____fput+0x16/0x20 [ 216.999907] task_work_run+0x145/0x1c0 [ 217.003805] exit_to_usermode_loop+0x273/0x2c0 [ 217.008499] do_syscall_64+0x53d/0x620 [ 217.012569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.017892] RIP: 0033:0x413ad1 [ 217.022130] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 217.041161] RSP: 002b:00007fff56d79800 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 217.049095] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413ad1 [ 217.056641] RDX: 0000001b30a20000 RSI: 0000000000000a6b RDI: 0000000000000003 [ 217.063897] RBP: 0000000000000001 R08: 00000000d0bf8a6b R09: 00000000d0bf8a6f [ 217.071177] R10: 00007fff56d798e0 R11: 0000000000000293 R12: 000000000075c9a0 [ 217.078458] R13: 000000000075c9a0 R14: 0000000000760518 R15: 000000000075c07c [ 217.088262] Kernel Offset: disabled [ 217.092149] Rebooting in 86400 seconds..