48415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:49:53 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xef00000000000000) [ 2772.799918][ T9778] FAULT_INJECTION: forcing a failure. [ 2772.799918][ T9778] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2772.813624][ T9778] CPU: 0 PID: 9778 Comm: syz-executor.5 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2772.823648][ T9778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2772.833732][ T9778] Call Trace: [ 2772.837034][ T9778] [ 2772.839985][ T9778] dump_stack_lvl+0x125/0x1b0 [ 2772.844702][ T9778] should_fail_ex+0x496/0x5b0 [ 2772.849425][ T9778] _copy_from_user+0x30/0xf0 [ 2772.854046][ T9778] copy_msghdr_from_user+0x99/0x160 [ 2772.859278][ T9778] ? __copy_msghdr+0x460/0x460 [ 2772.864077][ T9778] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2772.870101][ T9778] ? find_held_lock+0x2d/0x110 [ 2772.874917][ T9778] ___sys_sendmsg+0xff/0x1d0 [ 2772.879541][ T9778] ? do_recvmmsg+0x740/0x740 [ 2772.884165][ T9778] ? find_held_lock+0x2d/0x110 [ 2772.888996][ T9778] ? __fget_light+0xe6/0x260 [ 2772.893630][ T9778] __sys_sendmsg+0x117/0x1e0 [ 2772.898249][ T9778] ? __sys_sendmsg_sock+0x30/0x30 [ 2772.903321][ T9778] ? syscall_enter_from_user_mode+0x26/0x80 [ 2772.909264][ T9778] do_syscall_64+0x3f/0x110 [ 2772.913810][ T9778] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2772.919751][ T9778] RIP: 0033:0x7f6371c7cae9 [ 2772.924189][ T9778] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 20:49:53 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xef01000000000000) [ 2772.943870][ T9778] RSP: 002b:00007f6372a3d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2772.952407][ T9778] RAX: ffffffffffffffda RBX: 00007f6371d9bf80 RCX: 00007f6371c7cae9 [ 2772.960408][ T9778] RDX: 0000000000000000 RSI: 0000000020001480 RDI: 0000000000000003 [ 2772.968403][ T9778] RBP: 00007f6372a3d120 R08: 0000000000000000 R09: 0000000000000000 [ 2772.976401][ T9778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2772.984398][ T9778] R13: 000000000000000b R14: 00007f6371d9bf80 R15: 00007f6371ebfa48 [ 2772.992416][ T9778] 20:49:53 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf000000000000000) 20:49:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:49:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) (fail_nth: 2) 20:49:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf403, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:49:53 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) (fail_nth: 1) [ 2773.222252][ T9794] FAULT_INJECTION: forcing a failure. [ 2773.222252][ T9794] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2773.270394][ T9794] CPU: 1 PID: 9794 Comm: syz-executor.5 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2773.280443][ T9794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2773.290527][ T9794] Call Trace: [ 2773.293832][ T9794] [ 2773.296781][ T9794] dump_stack_lvl+0x125/0x1b0 [ 2773.301501][ T9794] should_fail_ex+0x496/0x5b0 [ 2773.306232][ T9794] _copy_from_user+0x30/0xf0 [ 2773.310862][ T9794] move_addr_to_kernel+0x68/0x150 [ 2773.315937][ T9794] __copy_msghdr+0x382/0x460 [ 2773.320561][ T9794] copy_msghdr_from_user+0xc2/0x160 [ 2773.325800][ T9794] ? __copy_msghdr+0x460/0x460 [ 2773.330606][ T9794] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2773.332087][ T9795] FAULT_INJECTION: forcing a failure. [ 2773.332087][ T9795] name failslab, interval 1, probability 0, space 0, times 0 [ 2773.336619][ T9794] ___sys_sendmsg+0xff/0x1d0 [ 2773.336659][ T9794] ? do_recvmmsg+0x740/0x740 [ 2773.336686][ T9794] ? find_held_lock+0x2d/0x110 [ 2773.336745][ T9794] ? __fget_light+0xe6/0x260 [ 2773.367830][ T9794] __sys_sendmsg+0x117/0x1e0 [ 2773.372528][ T9794] ? __sys_sendmsg_sock+0x30/0x30 [ 2773.377568][ T9794] ? xfd_validate_state+0x5d/0x180 [ 2773.382743][ T9794] ? syscall_enter_from_user_mode+0x26/0x80 [ 2773.388670][ T9794] do_syscall_64+0x3f/0x110 [ 2773.393191][ T9794] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2773.399112][ T9794] RIP: 0033:0x7f6371c7cae9 [ 2773.403548][ T9794] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2773.423183][ T9794] RSP: 002b:00007f6372a3d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2773.431612][ T9794] RAX: ffffffffffffffda RBX: 00007f6371d9bf80 RCX: 00007f6371c7cae9 [ 2773.439599][ T9794] RDX: 0000000000000000 RSI: 0000000020001480 RDI: 0000000000000003 [ 2773.447592][ T9794] RBP: 00007f6372a3d120 R08: 0000000000000000 R09: 0000000000000000 [ 2773.455581][ T9794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2773.463567][ T9794] R13: 000000000000000b R14: 00007f6371d9bf80 R15: 00007f6371ebfa48 [ 2773.471584][ T9794] [ 2773.494951][ T9795] CPU: 0 PID: 9795 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2773.504993][ T9795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2773.515080][ T9795] Call Trace: [ 2773.518374][ T9795] [ 2773.521325][ T9795] dump_stack_lvl+0x125/0x1b0 [ 2773.526129][ T9795] should_fail_ex+0x496/0x5b0 [ 2773.530847][ T9795] should_failslab+0x9/0x20 [ 2773.535381][ T9795] __kmem_cache_alloc_node+0x6b/0x310 20:49:54 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf001000000000000) [ 2773.540783][ T9795] ? alloc_pipe_info+0x10f/0x580 [ 2773.545771][ T9795] kmalloc_trace+0x25/0xe0 [ 2773.550234][ T9795] alloc_pipe_info+0x10f/0x580 [ 2773.555037][ T9795] splice_direct_to_actor+0x78b/0xa30 [ 2773.560470][ T9795] ? folio_flags.constprop.0+0x150/0x150 [ 2773.566150][ T9795] ? apparmor_file_permission+0x258/0x540 [ 2773.571905][ T9795] ? vfs_splice_read+0x3b0/0x3b0 [ 2773.576882][ T9795] ? bpf_lsm_file_permission+0x9/0x10 [ 2773.582291][ T9795] ? security_file_permission+0x94/0x100 [ 2773.587958][ T9795] do_splice_direct+0x1af/0x280 [ 2773.592840][ T9795] ? splice_direct_to_actor+0xa30/0xa30 [ 2773.598403][ T9795] ? propagate_umount+0x1af0/0x1af0 [ 2773.603614][ T9795] ? bpf_lsm_file_permission+0x9/0x10 [ 2773.609001][ T9795] ? security_file_permission+0x94/0x100 [ 2773.614646][ T9795] do_sendfile+0xb3e/0x1310 [ 2773.619164][ T9795] ? bit_wait_io_timeout+0x160/0x160 [ 2773.624463][ T9795] ? vfs_iocb_iter_write+0x490/0x490 [ 2773.629757][ T9795] ? __fget_files+0x1c6/0x340 [ 2773.634460][ T9795] __x64_sys_sendfile64+0x1d6/0x220 [ 2773.639671][ T9795] ? ksys_write+0x1a7/0x250 [ 2773.644187][ T9795] ? __ia32_sys_sendfile+0x220/0x220 [ 2773.649490][ T9795] ? syscall_enter_from_user_mode+0x26/0x80 [ 2773.655401][ T9795] do_syscall_64+0x3f/0x110 [ 2773.659912][ T9795] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2773.665819][ T9795] RIP: 0033:0x7ff86ac7cae9 [ 2773.670325][ T9795] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2773.689940][ T9795] RSP: 002b:00007ff86b92c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2773.698357][ T9795] RAX: ffffffffffffffda RBX: 00007ff86ad9bf80 RCX: 00007ff86ac7cae9 [ 2773.706332][ T9795] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000010 [ 2773.714303][ T9795] RBP: 00007ff86b92c120 R08: 0000000000000000 R09: 0000000000000000 [ 2773.722273][ T9795] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000001 [ 2773.730243][ T9795] R13: 000000000000000b R14: 00007ff86ad9bf80 R15: 00007ff86aebfa48 [ 2773.738231][ T9795] 20:49:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) (fail_nth: 3) 20:49:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) (fail_nth: 1) 20:49:54 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf100000000000000) 20:49:54 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) (fail_nth: 2) 20:49:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2773.898148][ T9807] FAULT_INJECTION: forcing a failure. [ 2773.898148][ T9807] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2773.943192][ T9807] CPU: 1 PID: 9807 Comm: syz-executor.5 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2773.953250][ T9807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2773.963340][ T9807] Call Trace: [ 2773.966645][ T9807] [ 2773.968954][ T9812] FAULT_INJECTION: forcing a failure. [ 2773.968954][ T9812] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2773.969665][ T9807] dump_stack_lvl+0x125/0x1b0 [ 2773.969707][ T9807] should_fail_ex+0x496/0x5b0 [ 2773.992109][ T9807] _copy_from_user+0x30/0xf0 [ 2773.996740][ T9807] ____sys_sendmsg+0x55a/0x940 [ 2774.001544][ T9807] ? kernel_sendmsg+0x50/0x50 [ 2774.006267][ T9807] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2774.012283][ T9807] ? find_held_lock+0x2d/0x110 [ 2774.017074][ T9807] ___sys_sendmsg+0x135/0x1d0 [ 2774.021766][ T9807] ? do_recvmmsg+0x740/0x740 [ 2774.026364][ T9807] ? find_held_lock+0x2d/0x110 [ 2774.031159][ T9807] ? __fget_light+0xe6/0x260 [ 2774.035785][ T9807] __sys_sendmsg+0x117/0x1e0 [ 2774.040385][ T9807] ? __sys_sendmsg_sock+0x30/0x30 [ 2774.045429][ T9807] ? syscall_enter_from_user_mode+0x26/0x80 [ 2774.051346][ T9807] do_syscall_64+0x3f/0x110 [ 2774.055867][ T9807] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2774.061796][ T9807] RIP: 0033:0x7f6371c7cae9 [ 2774.066225][ T9807] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2774.085856][ T9807] RSP: 002b:00007f6372a3d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2774.094287][ T9807] RAX: ffffffffffffffda RBX: 00007f6371d9bf80 RCX: 00007f6371c7cae9 [ 2774.102285][ T9807] RDX: 0000000000000000 RSI: 0000000020001480 RDI: 0000000000000003 [ 2774.110285][ T9807] RBP: 00007f6372a3d120 R08: 0000000000000000 R09: 0000000000000000 [ 2774.118272][ T9807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2774.126250][ T9807] R13: 000000000000000b R14: 00007f6371d9bf80 R15: 00007f6371ebfa48 [ 2774.134241][ T9807] [ 2774.178918][ T9812] CPU: 1 PID: 9812 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2774.188968][ T9812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2774.199050][ T9812] Call Trace: [ 2774.202335][ T9812] [ 2774.205267][ T9812] dump_stack_lvl+0x125/0x1b0 [ 2774.209964][ T9812] should_fail_ex+0x496/0x5b0 [ 2774.214663][ T9812] _copy_from_user+0x30/0xf0 [ 2774.219266][ T9812] copy_msghdr_from_user+0x99/0x160 [ 2774.224484][ T9812] ? __copy_msghdr+0x460/0x460 [ 2774.229281][ T9812] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2774.235285][ T9812] ? find_held_lock+0x2d/0x110 [ 2774.240068][ T9812] ___sys_sendmsg+0xff/0x1d0 [ 2774.244674][ T9812] ? do_recvmmsg+0x740/0x740 [ 2774.249267][ T9812] ? find_held_lock+0x2d/0x110 [ 2774.254067][ T9812] ? __fget_light+0xe6/0x260 [ 2774.258674][ T9812] __sys_sendmsg+0x117/0x1e0 [ 2774.263270][ T9812] ? __sys_sendmsg_sock+0x30/0x30 [ 2774.268314][ T9812] ? syscall_enter_from_user_mode+0x26/0x80 [ 2774.274236][ T9812] do_syscall_64+0x3f/0x110 [ 2774.278753][ T9812] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2774.284755][ T9812] RIP: 0033:0x7f6554c7cae9 [ 2774.289189][ T9812] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2774.308806][ T9812] RSP: 002b:00007f65559830c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2774.317224][ T9812] RAX: ffffffffffffffda RBX: 00007f6554d9c050 RCX: 00007f6554c7cae9 [ 2774.325196][ T9812] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000004 [ 2774.333166][ T9812] RBP: 00007f6555983120 R08: 0000000000000000 R09: 0000000000000000 [ 2774.341139][ T9812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2774.349111][ T9812] R13: 000000000000006e R14: 00007f6554d9c050 R15: 00007f6554ebfa48 [ 2774.357097][ T9812] [ 2774.376740][ T9808] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2774.378090][ T9815] FAULT_INJECTION: forcing a failure. [ 2774.378090][ T9815] name failslab, interval 1, probability 0, space 0, times 0 [ 2774.403204][ T9815] CPU: 1 PID: 9815 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2774.413236][ T9815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2774.423319][ T9815] Call Trace: [ 2774.426624][ T9815] [ 2774.429599][ T9815] dump_stack_lvl+0x125/0x1b0 [ 2774.434317][ T9815] should_fail_ex+0x496/0x5b0 [ 2774.439042][ T9815] should_failslab+0x9/0x20 [ 2774.443185][ T9808] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2774.443643][ T9815] __kmem_cache_alloc_node+0x6b/0x310 [ 2774.458140][ T9815] ? alloc_pipe_info+0x1ed/0x580 [ 2774.463122][ T9815] ? alloc_pipe_info+0x1ed/0x580 [ 2774.468099][ T9815] __kmalloc+0x4f/0x100 [ 2774.472289][ T9815] alloc_pipe_info+0x1ed/0x580 [ 2774.477093][ T9815] splice_direct_to_actor+0x78b/0xa30 [ 2774.482512][ T9815] ? folio_flags.constprop.0+0x150/0x150 [ 2774.488186][ T9815] ? apparmor_file_permission+0x258/0x540 [ 2774.493939][ T9815] ? vfs_splice_read+0x3b0/0x3b0 [ 2774.498921][ T9815] ? bpf_lsm_file_permission+0x9/0x10 [ 2774.504337][ T9815] ? security_file_permission+0x94/0x100 [ 2774.510017][ T9815] do_splice_direct+0x1af/0x280 [ 2774.514907][ T9815] ? splice_direct_to_actor+0xa30/0xa30 [ 2774.520494][ T9815] ? propagate_umount+0x1af0/0x1af0 20:49:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) (fail_nth: 4) 20:49:55 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf101000000000000) [ 2774.525732][ T9815] ? bpf_lsm_file_permission+0x9/0x10 [ 2774.531141][ T9815] ? security_file_permission+0x94/0x100 [ 2774.536900][ T9815] do_sendfile+0xb3e/0x1310 [ 2774.540846][ T9823] FAULT_INJECTION: forcing a failure. [ 2774.540846][ T9823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2774.541434][ T9815] ? bit_wait_io_timeout+0x160/0x160 [ 2774.559763][ T9815] ? vfs_iocb_iter_write+0x490/0x490 [ 2774.565086][ T9815] ? __fget_files+0x1c6/0x340 [ 2774.569814][ T9815] __x64_sys_sendfile64+0x1d6/0x220 [ 2774.575048][ T9815] ? ksys_write+0x1a7/0x250 [ 2774.579593][ T9815] ? __ia32_sys_sendfile+0x220/0x220 [ 2774.584913][ T9815] ? syscall_enter_from_user_mode+0x26/0x80 [ 2774.590855][ T9815] do_syscall_64+0x3f/0x110 [ 2774.595398][ T9815] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2774.601356][ T9815] RIP: 0033:0x7ff86ac7cae9 [ 2774.605800][ T9815] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 20:49:55 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf200000000000000) [ 2774.625442][ T9815] RSP: 002b:00007ff86b92c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2774.633890][ T9815] RAX: ffffffffffffffda RBX: 00007ff86ad9bf80 RCX: 00007ff86ac7cae9 [ 2774.641889][ T9815] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000010 [ 2774.649890][ T9815] RBP: 00007ff86b92c120 R08: 0000000000000000 R09: 0000000000000000 [ 2774.657887][ T9815] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000001 [ 2774.665971][ T9815] R13: 000000000000000b R14: 00007ff86ad9bf80 R15: 00007ff86aebfa48 [ 2774.673986][ T9815] [ 2774.679843][ T9808] CPU: 0 PID: 9808 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2774.689871][ T9808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2774.699944][ T9808] Call Trace: [ 2774.703224][ T9808] [ 2774.706157][ T9808] dump_stack_lvl+0x125/0x1b0 [ 2774.710851][ T9808] sysfs_warn_dup+0x7f/0xa0 [ 2774.715372][ T9808] sysfs_create_dir_ns+0x247/0x2a0 [ 2774.720485][ T9808] ? sysfs_create_mount_point+0xb0/0xb0 [ 2774.726032][ T9808] ? spin_bug+0x1d0/0x1d0 [ 2774.730380][ T9808] ? net_namespace+0x12/0x40 [ 2774.734986][ T9808] ? device_namespace+0x8d/0xc0 [ 2774.739854][ T9808] kobject_add_internal+0x2c8/0x960 [ 2774.745076][ T9808] kobject_add+0x16f/0x240 [ 2774.749503][ T9808] ? kset_create_and_add+0x190/0x190 [ 2774.754801][ T9808] ? do_raw_spin_unlock+0x173/0x230 [ 2774.760015][ T9808] ? kobject_put+0xbe/0x440 [ 2774.764555][ T9808] device_add+0x289/0x1aa0 [ 2774.768989][ T9808] ? device_initialize+0x510/0x510 [ 2774.774125][ T9808] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2774.780999][ T9808] ? __init_waitqueue_head+0xca/0x150 [ 2774.786395][ T9808] netdev_register_kobject+0x183/0x3f0 [ 2774.791878][ T9808] register_netdevice+0xbdf/0x14a0 [ 2774.797001][ T9808] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2774.802909][ T9808] veth_newlink+0x4ef/0xa00 [ 2774.807432][ T9808] ? veth_set_features+0x2d0/0x2d0 [ 2774.812550][ T9808] ? rtnl_create_link+0xc9c/0xfd0 [ 2774.817588][ T9808] ? __rtnl_newlink+0x108a/0x1930 [ 2774.822626][ T9808] ? rtnl_newlink+0x67/0xa0 [ 2774.827188][ T9808] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2774.832399][ T9808] ? alloc_netdev_mqs+0xee6/0x1290 [ 2774.837546][ T9808] ? rtnl_create_link+0xa6d/0xfd0 [ 2774.842598][ T9808] ? veth_set_features+0x2d0/0x2d0 [ 2774.847720][ T9808] __rtnl_newlink+0x1173/0x1930 [ 2774.852610][ T9808] ? rtnl_link_unregister+0x260/0x260 [ 2774.858033][ T9808] rtnl_newlink+0x67/0xa0 [ 2774.862384][ T9808] ? __rtnl_newlink+0x1930/0x1930 [ 2774.867442][ T9808] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2774.872417][ T9808] ? rtnl_getlink+0xb40/0xb40 [ 2774.877236][ T9808] netlink_rcv_skb+0x16b/0x440 [ 2774.882021][ T9808] ? rtnl_getlink+0xb40/0xb40 [ 2774.886721][ T9808] ? netlink_ack+0x1370/0x1370 [ 2774.891509][ T9808] ? netlink_deliver_tap+0x1a0/0xd00 [ 2774.896807][ T9808] netlink_unicast+0x53b/0x810 [ 2774.901582][ T9808] ? netlink_attachskb+0x880/0x880 [ 2774.906705][ T9808] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2774.912607][ T9808] ? __phys_addr_symbol+0x30/0x70 [ 2774.917642][ T9808] ? __check_object_size+0x323/0x730 [ 2774.922944][ T9808] netlink_sendmsg+0x93c/0xe40 [ 2774.927721][ T9808] ? netlink_unicast+0x810/0x810 [ 2774.932681][ T9808] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2774.937977][ T9808] ? netlink_unicast+0x810/0x810 [ 2774.942944][ T9808] __sock_sendmsg+0xd5/0x180 [ 2774.947552][ T9808] ____sys_sendmsg+0x6ac/0x940 [ 2774.952328][ T9808] ? copy_msghdr_from_user+0x10b/0x160 [ 2774.957900][ T9808] ? kernel_sendmsg+0x50/0x50 [ 2774.962614][ T9808] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2774.968624][ T9808] ___sys_sendmsg+0x135/0x1d0 [ 2774.973339][ T9808] ? do_recvmmsg+0x740/0x740 [ 2774.977970][ T9808] ? find_held_lock+0x2d/0x110 [ 2774.982780][ T9808] ? __fget_light+0xe6/0x260 [ 2774.987392][ T9808] __sys_sendmsg+0x117/0x1e0 [ 2774.992003][ T9808] ? __sys_sendmsg_sock+0x30/0x30 [ 2774.997044][ T9808] ? xfd_validate_state+0x5d/0x180 [ 2775.002191][ T9808] ? syscall_enter_from_user_mode+0x26/0x80 [ 2775.008108][ T9808] do_syscall_64+0x3f/0x110 [ 2775.012622][ T9808] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2775.018533][ T9808] RIP: 0033:0x7f6554c7cae9 [ 2775.022961][ T9808] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2775.042573][ T9808] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2775.050993][ T9808] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2775.058968][ T9808] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2775.066946][ T9808] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2775.074916][ T9808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2775.082890][ T9808] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2775.090881][ T9808] [ 2775.124163][ T9823] CPU: 0 PID: 9823 Comm: syz-executor.5 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2775.134205][ T9823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2775.144286][ T9823] Call Trace: [ 2775.147588][ T9823] [ 2775.150532][ T9823] dump_stack_lvl+0x125/0x1b0 [ 2775.155248][ T9823] should_fail_ex+0x496/0x5b0 [ 2775.159974][ T9823] _copy_to_user+0x30/0xb0 [ 2775.164417][ T9823] simple_read_from_buffer+0xd0/0x150 [ 2775.165631][ T1228] ieee802154 phy0 wpan0: encryption failed: -22 [ 2775.169802][ T9823] proc_fail_nth_read+0x1b0/0x280 [ 2775.169846][ T9823] ? proc_sessionid_read+0x280/0x280 [ 2775.176353][ T1228] ieee802154 phy1 wpan1: encryption failed: -22 [ 2775.181061][ T9823] ? security_file_permission+0xdc/0x100 [ 2775.181101][ T9823] ? proc_sessionid_read+0x280/0x280 [ 2775.203570][ T9823] vfs_read+0x1ce/0x8f0 [ 2775.207776][ T9823] ? kernel_read+0x1b0/0x1b0 [ 2775.212410][ T9823] ? __fget_files+0x1c6/0x340 [ 2775.217138][ T9823] ksys_read+0x12f/0x250 [ 2775.221414][ T9823] ? vfs_write+0xdf0/0xdf0 [ 2775.225874][ T9823] ? syscall_enter_from_user_mode+0x26/0x80 [ 2775.231814][ T9823] do_syscall_64+0x3f/0x110 [ 2775.236353][ T9823] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2775.242292][ T9823] RIP: 0033:0x7f6371c7b78c [ 2775.246727][ T9823] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 2775.266366][ T9823] RSP: 002b:00007f6372a3d0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 20:49:55 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) (fail_nth: 3) [ 2775.274808][ T9823] RAX: ffffffffffffffda RBX: 00007f6371d9bf80 RCX: 00007f6371c7b78c [ 2775.282784][ T9823] RDX: 000000000000000f RSI: 00007f6372a3d130 RDI: 0000000000000004 [ 2775.290757][ T9823] RBP: 00007f6372a3d120 R08: 0000000000000000 R09: 0000000000000000 [ 2775.298732][ T9823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2775.306710][ T9823] R13: 000000000000000b R14: 00007f6371d9bf80 R15: 00007f6371ebfa48 [ 2775.314707][ T9823] 20:49:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd03, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:49:56 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf201000000000000) [ 2775.431246][ T9827] FAULT_INJECTION: forcing a failure. [ 2775.431246][ T9827] name failslab, interval 1, probability 0, space 0, times 0 [ 2775.452832][ T9808] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2775.458012][ T9827] CPU: 0 PID: 9827 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2775.477434][ T9827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2775.487518][ T9827] Call Trace: [ 2775.490816][ T9827] [ 2775.493767][ T9827] dump_stack_lvl+0x125/0x1b0 [ 2775.498483][ T9827] should_fail_ex+0x496/0x5b0 [ 2775.503202][ T9827] should_failslab+0x9/0x20 [ 2775.507735][ T9827] __kmem_cache_alloc_node+0x6b/0x310 [ 2775.513135][ T9827] ? copy_splice_read+0x1ac/0x8f0 [ 2775.518205][ T9827] ? copy_splice_read+0x1ac/0x8f0 [ 2775.523275][ T9827] __kmalloc+0x4f/0x100 [ 2775.527460][ T9827] copy_splice_read+0x1ac/0x8f0 [ 2775.532343][ T9827] ? warn_unsupported+0xc0/0xc0 [ 2775.537218][ T9827] ? security_file_permission+0xdc/0x100 [ 2775.542873][ T9827] ? shmem_read_mapping_page_gfp+0x240/0x240 [ 2775.548860][ T9827] vfs_splice_read+0x2ea/0x3b0 [ 2775.553648][ T9827] splice_direct_to_actor+0x2a5/0xa30 [ 2775.559033][ T9827] ? folio_flags.constprop.0+0x150/0x150 [ 2775.564688][ T9827] ? vfs_splice_read+0x3b0/0x3b0 [ 2775.569635][ T9827] ? bpf_lsm_file_permission+0x9/0x10 [ 2775.575021][ T9827] ? security_file_permission+0x94/0x100 [ 2775.580753][ T9827] do_splice_direct+0x1af/0x280 [ 2775.585626][ T9827] ? splice_direct_to_actor+0xa30/0xa30 [ 2775.591187][ T9827] ? propagate_umount+0x1af0/0x1af0 [ 2775.596399][ T9827] ? bpf_lsm_file_permission+0x9/0x10 [ 2775.601784][ T9827] ? security_file_permission+0x94/0x100 [ 2775.607429][ T9827] do_sendfile+0xb3e/0x1310 [ 2775.611950][ T9827] ? bit_wait_io_timeout+0x160/0x160 [ 2775.617248][ T9827] ? vfs_iocb_iter_write+0x490/0x490 [ 2775.622543][ T9827] ? __fget_files+0x1c6/0x340 [ 2775.627241][ T9827] __x64_sys_sendfile64+0x1d6/0x220 [ 2775.632453][ T9827] ? ksys_write+0x1a7/0x250 [ 2775.636966][ T9827] ? __ia32_sys_sendfile+0x220/0x220 [ 2775.642264][ T9827] ? syscall_enter_from_user_mode+0x26/0x80 [ 2775.648175][ T9827] do_syscall_64+0x3f/0x110 [ 2775.652687][ T9827] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2775.658682][ T9827] RIP: 0033:0x7ff86ac7cae9 [ 2775.663188][ T9827] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2775.682798][ T9827] RSP: 002b:00007ff86b92c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2775.691216][ T9827] RAX: ffffffffffffffda RBX: 00007ff86ad9bf80 RCX: 00007ff86ac7cae9 [ 2775.699194][ T9827] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000010 [ 2775.707168][ T9827] RBP: 00007ff86b92c120 R08: 0000000000000000 R09: 0000000000000000 [ 2775.715141][ T9827] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000001 [ 2775.723113][ T9827] R13: 000000000000000b R14: 00007ff86ad9bf80 R15: 00007ff86aebfa48 20:49:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2775.731100][ T9827] 20:49:56 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf300000000000000) 20:49:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) (fail_nth: 2) 20:49:56 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) (fail_nth: 4) 20:49:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:49:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:49:56 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf301000000000000) 20:49:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0x25, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2775.974464][ T9848] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:49:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2776.053882][ T9848] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2776.097579][ T9848] CPU: 0 PID: 9848 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2776.098300][ T9855] FAULT_INJECTION: forcing a failure. [ 2776.098300][ T9855] name failslab, interval 1, probability 0, space 0, times 0 [ 2776.107601][ T9848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2776.107620][ T9848] Call Trace: [ 2776.107630][ T9848] [ 2776.107640][ T9848] dump_stack_lvl+0x125/0x1b0 [ 2776.107676][ T9848] sysfs_warn_dup+0x7f/0xa0 20:49:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0x4e20, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2776.107712][ T9848] sysfs_create_dir_ns+0x247/0x2a0 [ 2776.107734][ T9848] ? sysfs_create_mount_point+0xb0/0xb0 [ 2776.107759][ T9848] ? spin_bug+0x1d0/0x1d0 [ 2776.107798][ T9848] ? net_namespace+0x12/0x40 [ 2776.107838][ T9848] ? device_namespace+0x8d/0xc0 [ 2776.107871][ T9848] kobject_add_internal+0x2c8/0x960 [ 2776.107906][ T9848] kobject_add+0x16f/0x240 [ 2776.180056][ T9848] ? kset_create_and_add+0x190/0x190 [ 2776.185382][ T9848] ? do_raw_spin_unlock+0x173/0x230 [ 2776.190622][ T9848] ? kobject_put+0xbe/0x440 [ 2776.195168][ T9848] device_add+0x289/0x1aa0 [ 2776.199615][ T9848] ? device_initialize+0x510/0x510 [ 2776.204756][ T9848] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2776.211623][ T9848] ? __init_waitqueue_head+0xca/0x150 [ 2776.217016][ T9848] netdev_register_kobject+0x183/0x3f0 [ 2776.222487][ T9848] register_netdevice+0xbdf/0x14a0 [ 2776.227607][ T9848] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2776.233515][ T9848] veth_newlink+0x4ef/0xa00 [ 2776.238031][ T9848] ? veth_set_features+0x2d0/0x2d0 [ 2776.243146][ T9848] ? rtnl_create_link+0xc9c/0xfd0 [ 2776.248182][ T9848] ? __rtnl_newlink+0x108a/0x1930 [ 2776.253220][ T9848] ? rtnl_newlink+0x67/0xa0 [ 2776.257779][ T9848] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2776.262992][ T9848] ? alloc_netdev_mqs+0xee6/0x1290 [ 2776.268115][ T9848] ? rtnl_create_link+0xa6d/0xfd0 [ 2776.273155][ T9848] ? veth_set_features+0x2d0/0x2d0 [ 2776.278271][ T9848] __rtnl_newlink+0x1173/0x1930 [ 2776.283149][ T9848] ? rtnl_link_unregister+0x260/0x260 [ 2776.288562][ T9848] rtnl_newlink+0x67/0xa0 [ 2776.292905][ T9848] ? __rtnl_newlink+0x1930/0x1930 [ 2776.297943][ T9848] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2776.302898][ T9848] ? rtnl_getlink+0xb40/0xb40 [ 2776.307603][ T9848] netlink_rcv_skb+0x16b/0x440 [ 2776.312375][ T9848] ? rtnl_getlink+0xb40/0xb40 [ 2776.317065][ T9848] ? netlink_ack+0x1370/0x1370 [ 2776.321850][ T9848] ? netlink_deliver_tap+0x1a0/0xd00 [ 2776.327149][ T9848] netlink_unicast+0x53b/0x810 [ 2776.331923][ T9848] ? netlink_attachskb+0x880/0x880 [ 2776.337038][ T9848] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2776.342939][ T9848] ? __phys_addr_symbol+0x30/0x70 [ 2776.347971][ T9848] ? __check_object_size+0x323/0x730 [ 2776.353279][ T9848] netlink_sendmsg+0x93c/0xe40 [ 2776.358054][ T9848] ? netlink_unicast+0x810/0x810 [ 2776.363001][ T9848] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2776.368293][ T9848] ? netlink_unicast+0x810/0x810 [ 2776.373241][ T9848] __sock_sendmsg+0xd5/0x180 [ 2776.377848][ T9848] ____sys_sendmsg+0x6ac/0x940 [ 2776.382629][ T9848] ? copy_msghdr_from_user+0x10b/0x160 [ 2776.388091][ T9848] ? kernel_sendmsg+0x50/0x50 [ 2776.392790][ T9848] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2776.398793][ T9848] ___sys_sendmsg+0x135/0x1d0 [ 2776.403476][ T9848] ? do_recvmmsg+0x740/0x740 [ 2776.408071][ T9848] ? find_held_lock+0x2d/0x110 [ 2776.412869][ T9848] ? __fget_light+0xe6/0x260 [ 2776.417474][ T9848] __sys_sendmsg+0x117/0x1e0 [ 2776.422068][ T9848] ? __sys_sendmsg_sock+0x30/0x30 [ 2776.427094][ T9848] ? xfd_validate_state+0x5d/0x180 [ 2776.432237][ T9848] ? syscall_enter_from_user_mode+0x26/0x80 [ 2776.438181][ T9848] do_syscall_64+0x3f/0x110 [ 2776.442695][ T9848] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2776.448605][ T9848] RIP: 0033:0x7f6554c7cae9 [ 2776.453027][ T9848] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2776.472639][ T9848] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2776.481057][ T9848] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2776.489117][ T9848] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2776.497089][ T9848] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2776.505058][ T9848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2776.513029][ T9848] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2776.521018][ T9848] 20:49:57 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0xa, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:49:57 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) [ 2776.557831][ T9848] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2776.610462][ T9855] CPU: 1 PID: 9855 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2776.620522][ T9855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2776.630608][ T9855] Call Trace: [ 2776.633909][ T9855] [ 2776.636858][ T9855] dump_stack_lvl+0x125/0x1b0 [ 2776.641593][ T9855] should_fail_ex+0x496/0x5b0 [ 2776.646328][ T9855] should_failslab+0x9/0x20 [ 2776.650869][ T9855] kmem_cache_alloc_node+0x71/0x3c0 [ 2776.656112][ T9855] ? __alloc_skb+0x287/0x330 [ 2776.660754][ T9855] __alloc_skb+0x287/0x330 [ 2776.665217][ T9855] ? __napi_build_skb+0x50/0x50 [ 2776.670113][ T9855] ? preempt_count_sub+0x150/0x150 [ 2776.675257][ T9855] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2776.681178][ T9855] ? apparmor_socket_getpeersec_dgram+0x9/0x10 [ 2776.687371][ T9855] netlink_sendmsg+0x9c6/0xe40 [ 2776.692173][ T9855] ? netlink_unicast+0x810/0x810 [ 2776.697144][ T9855] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2776.702457][ T9855] ? netlink_unicast+0x810/0x810 [ 2776.707425][ T9855] __sock_sendmsg+0xd5/0x180 [ 2776.712059][ T9855] ____sys_sendmsg+0x6ac/0x940 [ 2776.716858][ T9855] ? copy_msghdr_from_user+0x10b/0x160 [ 2776.722328][ T9855] ? kernel_sendmsg+0x50/0x50 [ 2776.727024][ T9855] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2776.733015][ T9855] ? find_held_lock+0x2d/0x110 [ 2776.737801][ T9855] ___sys_sendmsg+0x135/0x1d0 [ 2776.742490][ T9855] ? do_recvmmsg+0x740/0x740 [ 2776.747120][ T9855] ? find_held_lock+0x2d/0x110 [ 2776.751945][ T9855] ? __fget_light+0xe6/0x260 [ 2776.756563][ T9855] __sys_sendmsg+0x117/0x1e0 [ 2776.761169][ T9855] ? __sys_sendmsg_sock+0x30/0x30 [ 2776.766218][ T9855] ? syscall_enter_from_user_mode+0x26/0x80 [ 2776.772145][ T9855] do_syscall_64+0x3f/0x110 [ 2776.776747][ T9855] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2776.782654][ T9855] RIP: 0033:0x7f6554c7cae9 [ 2776.787076][ T9855] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2776.806689][ T9855] RSP: 002b:00007f65559830c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2776.815143][ T9855] RAX: ffffffffffffffda RBX: 00007f6554d9c050 RCX: 00007f6554c7cae9 [ 2776.823120][ T9855] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000004 [ 2776.831090][ T9855] RBP: 00007f6555983120 R08: 0000000000000000 R09: 0000000000000000 [ 2776.839061][ T9855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2776.847034][ T9855] R13: 000000000000006e R14: 00007f6554d9c050 R15: 00007f6554ebfa48 [ 2776.855022][ T9855] 20:49:57 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf400000000000000) 20:49:57 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x63, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:49:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:49:57 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf401000000000000) 20:49:57 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e25, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:49:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:49:57 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e2f, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2777.153670][ T9883] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:49:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2777.220453][ T9883] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2777.248596][ T9883] CPU: 1 PID: 9883 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2777.258655][ T9883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 20:49:57 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf500000000000000) [ 2777.268741][ T9883] Call Trace: [ 2777.272040][ T9883] [ 2777.274990][ T9883] dump_stack_lvl+0x125/0x1b0 [ 2777.279706][ T9883] sysfs_warn_dup+0x7f/0xa0 [ 2777.284254][ T9883] sysfs_create_dir_ns+0x247/0x2a0 [ 2777.289402][ T9883] ? sysfs_create_mount_point+0xb0/0xb0 [ 2777.294982][ T9883] ? spin_bug+0x1d0/0x1d0 [ 2777.299357][ T9883] ? net_namespace+0x12/0x40 [ 2777.303985][ T9883] ? device_namespace+0x8d/0xc0 [ 2777.308871][ T9883] kobject_add_internal+0x2c8/0x960 [ 2777.314096][ T9883] kobject_add+0x16f/0x240 [ 2777.318531][ T9883] ? kset_create_and_add+0x190/0x190 [ 2777.323830][ T9883] ? do_raw_spin_unlock+0x173/0x230 [ 2777.329051][ T9883] ? kobject_put+0xbe/0x440 [ 2777.333564][ T9883] ? device_add+0xc35/0x1aa0 [ 2777.338162][ T9883] device_add+0x289/0x1aa0 [ 2777.342580][ T9883] ? device_initialize+0x510/0x510 [ 2777.347701][ T9883] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2777.354563][ T9883] ? __init_waitqueue_head+0xca/0x150 [ 2777.359953][ T9883] netdev_register_kobject+0x183/0x3f0 [ 2777.365427][ T9883] register_netdevice+0xbdf/0x14a0 [ 2777.370549][ T9883] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2777.376452][ T9883] veth_newlink+0x4ef/0xa00 [ 2777.381050][ T9883] ? veth_set_features+0x2d0/0x2d0 [ 2777.386166][ T9883] ? rtnl_create_link+0xc9c/0xfd0 [ 2777.391201][ T9883] ? __rtnl_newlink+0x108a/0x1930 [ 2777.396235][ T9883] ? rtnl_newlink+0x67/0xa0 [ 2777.400794][ T9883] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2777.406001][ T9883] ? alloc_netdev_mqs+0xee6/0x1290 [ 2777.411125][ T9883] ? rtnl_create_link+0xa6d/0xfd0 [ 2777.416166][ T9883] ? veth_set_features+0x2d0/0x2d0 [ 2777.421285][ T9883] __rtnl_newlink+0x1173/0x1930 [ 2777.426162][ T9883] ? rtnl_link_unregister+0x260/0x260 [ 2777.431574][ T9883] rtnl_newlink+0x67/0xa0 [ 2777.435919][ T9883] ? __rtnl_newlink+0x1930/0x1930 [ 2777.440955][ T9883] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2777.445911][ T9883] ? rtnl_getlink+0xb40/0xb40 [ 2777.450617][ T9883] netlink_rcv_skb+0x16b/0x440 [ 2777.455395][ T9883] ? rtnl_getlink+0xb40/0xb40 [ 2777.460093][ T9883] ? netlink_ack+0x1370/0x1370 [ 2777.464877][ T9883] ? netlink_deliver_tap+0x1a0/0xd00 [ 2777.470174][ T9883] netlink_unicast+0x53b/0x810 [ 2777.474946][ T9883] ? netlink_attachskb+0x880/0x880 [ 2777.480058][ T9883] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2777.485955][ T9883] ? __phys_addr_symbol+0x30/0x70 [ 2777.490990][ T9883] ? __check_object_size+0x323/0x730 [ 2777.496293][ T9883] netlink_sendmsg+0x93c/0xe40 [ 2777.501067][ T9883] ? netlink_unicast+0x810/0x810 [ 2777.506015][ T9883] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2777.511305][ T9883] ? netlink_unicast+0x810/0x810 [ 2777.516246][ T9883] __sock_sendmsg+0xd5/0x180 [ 2777.520848][ T9883] ____sys_sendmsg+0x6ac/0x940 [ 2777.525627][ T9883] ? copy_msghdr_from_user+0x10b/0x160 [ 2777.531092][ T9883] ? kernel_sendmsg+0x50/0x50 [ 2777.535790][ T9883] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2777.541786][ T9883] ___sys_sendmsg+0x135/0x1d0 [ 2777.546470][ T9883] ? do_recvmmsg+0x740/0x740 [ 2777.551410][ T9883] ? find_held_lock+0x2d/0x110 [ 2777.556210][ T9883] ? __fget_light+0xe6/0x260 [ 2777.560815][ T9883] __sys_sendmsg+0x117/0x1e0 [ 2777.565412][ T9883] ? __sys_sendmsg_sock+0x30/0x30 [ 2777.570438][ T9883] ? xfd_validate_state+0x5d/0x180 [ 2777.575578][ T9883] ? syscall_enter_from_user_mode+0x26/0x80 [ 2777.581499][ T9883] do_syscall_64+0x3f/0x110 [ 2777.586013][ T9883] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2777.591920][ T9883] RIP: 0033:0x7f6554c7cae9 [ 2777.596338][ T9883] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2777.615953][ T9883] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2777.624372][ T9883] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2777.632344][ T9883] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2777.640315][ T9883] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2777.648285][ T9883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2777.656258][ T9883] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2777.664254][ T9883] 20:49:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2777.684262][ T9883] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:49:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x2, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2777.770468][ T9888] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:49:58 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000003) 20:49:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:49:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x3, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:49:58 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf501000000000000) 20:49:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:49:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x810, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2777.980074][ T9905] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:49:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x4, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2778.031094][ T9905] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' 20:49:58 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf600000000000000) [ 2778.094597][ T9905] CPU: 0 PID: 9905 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2778.104653][ T9905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2778.114749][ T9905] Call Trace: [ 2778.118060][ T9905] [ 2778.121013][ T9905] dump_stack_lvl+0x125/0x1b0 [ 2778.125732][ T9905] sysfs_warn_dup+0x7f/0xa0 [ 2778.130288][ T9905] sysfs_create_dir_ns+0x247/0x2a0 [ 2778.135434][ T9905] ? sysfs_create_mount_point+0xb0/0xb0 20:49:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x5, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2778.141012][ T9905] ? spin_bug+0x1d0/0x1d0 [ 2778.145388][ T9905] ? net_namespace+0x12/0x40 [ 2778.150012][ T9905] ? device_namespace+0x8d/0xc0 [ 2778.154901][ T9905] kobject_add_internal+0x2c8/0x960 [ 2778.160148][ T9905] kobject_add+0x16f/0x240 [ 2778.164607][ T9905] ? kset_create_and_add+0x190/0x190 [ 2778.169930][ T9905] ? do_raw_spin_unlock+0x173/0x230 [ 2778.175174][ T9905] ? kobject_put+0xbe/0x440 [ 2778.179723][ T9905] device_add+0x289/0x1aa0 [ 2778.184178][ T9905] ? device_initialize+0x510/0x510 [ 2778.189339][ T9905] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2778.196223][ T9905] ? __init_waitqueue_head+0xca/0x150 [ 2778.201655][ T9905] netdev_register_kobject+0x183/0x3f0 [ 2778.207160][ T9905] register_netdevice+0xbdf/0x14a0 [ 2778.212308][ T9905] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2778.218248][ T9905] veth_newlink+0x4ef/0xa00 [ 2778.222790][ T9905] ? veth_set_features+0x2d0/0x2d0 [ 2778.227933][ T9905] ? rtnl_create_link+0xc9c/0xfd0 [ 2778.232993][ T9905] ? __rtnl_newlink+0x108a/0x1930 [ 2778.238060][ T9905] ? rtnl_newlink+0x67/0xa0 [ 2778.242659][ T9905] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2778.247893][ T9905] ? alloc_netdev_mqs+0xee6/0x1290 [ 2778.253048][ T9905] ? rtnl_create_link+0xa6d/0xfd0 [ 2778.258117][ T9905] ? veth_set_features+0x2d0/0x2d0 [ 2778.263269][ T9905] __rtnl_newlink+0x1173/0x1930 [ 2778.268181][ T9905] ? rtnl_link_unregister+0x260/0x260 [ 2778.273633][ T9905] rtnl_newlink+0x67/0xa0 [ 2778.278008][ T9905] ? __rtnl_newlink+0x1930/0x1930 [ 2778.283073][ T9905] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2778.288059][ T9905] ? rtnl_getlink+0xb40/0xb40 [ 2778.292796][ T9905] netlink_rcv_skb+0x16b/0x440 [ 2778.297592][ T9905] ? rtnl_getlink+0xb40/0xb40 [ 2778.302314][ T9905] ? netlink_ack+0x1370/0x1370 [ 2778.307139][ T9905] ? netlink_deliver_tap+0x1a0/0xd00 [ 2778.312461][ T9905] netlink_unicast+0x53b/0x810 [ 2778.317258][ T9905] ? netlink_attachskb+0x880/0x880 [ 2778.322413][ T9905] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2778.328343][ T9905] ? __phys_addr_symbol+0x30/0x70 [ 2778.333416][ T9905] ? __check_object_size+0x323/0x730 [ 2778.338751][ T9905] netlink_sendmsg+0x93c/0xe40 [ 2778.343554][ T9905] ? netlink_unicast+0x810/0x810 [ 2778.348533][ T9905] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2778.353850][ T9905] ? netlink_unicast+0x810/0x810 [ 2778.358846][ T9905] __sock_sendmsg+0xd5/0x180 [ 2778.363480][ T9905] ____sys_sendmsg+0x6ac/0x940 [ 2778.368286][ T9905] ? copy_msghdr_from_user+0x10b/0x160 [ 2778.373775][ T9905] ? kernel_sendmsg+0x50/0x50 [ 2778.378507][ T9905] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2778.384535][ T9905] ___sys_sendmsg+0x135/0x1d0 [ 2778.389247][ T9905] ? do_recvmmsg+0x740/0x740 [ 2778.393864][ T9905] ? find_held_lock+0x2d/0x110 [ 2778.398695][ T9905] ? __fget_light+0xe6/0x260 [ 2778.403330][ T9905] __sys_sendmsg+0x117/0x1e0 [ 2778.407952][ T9905] ? __sys_sendmsg_sock+0x30/0x30 [ 2778.413004][ T9905] ? xfd_validate_state+0x5d/0x180 [ 2778.418173][ T9905] ? syscall_enter_from_user_mode+0x26/0x80 [ 2778.424116][ T9905] do_syscall_64+0x3f/0x110 [ 2778.428658][ T9905] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2778.434594][ T9905] RIP: 0033:0x7f6554c7cae9 [ 2778.439033][ T9905] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2778.458673][ T9905] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2778.467129][ T9905] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2778.475135][ T9905] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2778.483138][ T9905] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2778.491140][ T9905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2778.499141][ T9905] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2778.507160][ T9905] 20:49:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x6, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:49:59 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf601000000000000) [ 2778.539263][ T9905] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:49:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x7, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2778.640900][ T9913] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:49:59 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000004) 20:49:59 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf700000000000000) 20:49:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:49:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x8, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:49:59 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:49:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1008, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2778.930308][ T9944] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:49:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x48, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:49:59 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf701000000000000) [ 2779.018184][ T9944] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2779.042795][ T9944] CPU: 1 PID: 9944 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2779.052850][ T9944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2779.062934][ T9944] Call Trace: [ 2779.066261][ T9944] [ 2779.069222][ T9944] dump_stack_lvl+0x125/0x1b0 [ 2779.073939][ T9944] sysfs_warn_dup+0x7f/0xa0 [ 2779.078488][ T9944] sysfs_create_dir_ns+0x247/0x2a0 [ 2779.083637][ T9944] ? sysfs_create_mount_point+0xb0/0xb0 [ 2779.089217][ T9944] ? spin_bug+0x1d0/0x1d0 [ 2779.093592][ T9944] ? net_namespace+0x12/0x40 [ 2779.098221][ T9944] ? device_namespace+0x8d/0xc0 [ 2779.103109][ T9944] kobject_add_internal+0x2c8/0x960 [ 2779.108354][ T9944] kobject_add+0x16f/0x240 [ 2779.112809][ T9944] ? kset_create_and_add+0x190/0x190 [ 2779.118136][ T9944] ? do_raw_spin_unlock+0x173/0x230 [ 2779.123379][ T9944] ? kobject_put+0xbe/0x440 [ 2779.127939][ T9944] device_add+0x289/0x1aa0 [ 2779.132394][ T9944] ? device_initialize+0x510/0x510 [ 2779.137552][ T9944] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2779.144445][ T9944] ? __init_waitqueue_head+0xca/0x150 [ 2779.149870][ T9944] netdev_register_kobject+0x183/0x3f0 [ 2779.155381][ T9944] register_netdevice+0xbdf/0x14a0 [ 2779.160528][ T9944] ? unregister_netdevice_queue+0x3c0/0x3c0 20:49:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x4c, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:49:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x68, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:49:59 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf800000000000000) [ 2779.166463][ T9944] veth_newlink+0x4ef/0xa00 [ 2779.171004][ T9944] ? veth_set_features+0x2d0/0x2d0 [ 2779.176152][ T9944] ? rtnl_create_link+0xc9c/0xfd0 [ 2779.181215][ T9944] ? __rtnl_newlink+0x108a/0x1930 [ 2779.186281][ T9944] ? rtnl_newlink+0x67/0xa0 [ 2779.190888][ T9944] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2779.196134][ T9944] ? alloc_netdev_mqs+0xee6/0x1290 [ 2779.201287][ T9944] ? rtnl_create_link+0xa6d/0xfd0 [ 2779.206352][ T9944] ? veth_set_features+0x2d0/0x2d0 [ 2779.211678][ T9944] __rtnl_newlink+0x1173/0x1930 [ 2779.217897][ T9944] ? rtnl_link_unregister+0x260/0x260 [ 2779.223356][ T9944] rtnl_newlink+0x67/0xa0 [ 2779.227726][ T9944] ? __rtnl_newlink+0x1930/0x1930 [ 2779.232790][ T9944] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2779.237771][ T9944] ? rtnl_getlink+0xb40/0xb40 [ 2779.242507][ T9944] netlink_rcv_skb+0x16b/0x440 [ 2779.247305][ T9944] ? rtnl_getlink+0xb40/0xb40 [ 2779.252024][ T9944] ? netlink_ack+0x1370/0x1370 [ 2779.256843][ T9944] ? netlink_deliver_tap+0x1a0/0xd00 [ 2779.262170][ T9944] netlink_unicast+0x53b/0x810 [ 2779.266972][ T9944] ? netlink_attachskb+0x880/0x880 [ 2779.272116][ T9944] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2779.278049][ T9944] ? __phys_addr_symbol+0x30/0x70 [ 2779.283112][ T9944] ? __check_object_size+0x323/0x730 [ 2779.288454][ T9944] netlink_sendmsg+0x93c/0xe40 [ 2779.293258][ T9944] ? netlink_unicast+0x810/0x810 [ 2779.298249][ T9944] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2779.303565][ T9944] ? netlink_unicast+0x810/0x810 [ 2779.308537][ T9944] __sock_sendmsg+0xd5/0x180 [ 2779.313171][ T9944] ____sys_sendmsg+0x6ac/0x940 [ 2779.317979][ T9944] ? copy_msghdr_from_user+0x10b/0x160 [ 2779.323481][ T9944] ? kernel_sendmsg+0x50/0x50 [ 2779.328204][ T9944] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2779.334233][ T9944] ___sys_sendmsg+0x135/0x1d0 [ 2779.338944][ T9944] ? do_recvmmsg+0x740/0x740 [ 2779.343565][ T9944] ? find_held_lock+0x2d/0x110 [ 2779.348400][ T9944] ? __fget_light+0xe6/0x260 [ 2779.353038][ T9944] __sys_sendmsg+0x117/0x1e0 [ 2779.357662][ T9944] ? __sys_sendmsg_sock+0x30/0x30 [ 2779.362802][ T9944] ? xfd_validate_state+0x5d/0x180 [ 2779.367978][ T9944] ? syscall_enter_from_user_mode+0x26/0x80 [ 2779.373928][ T9944] do_syscall_64+0x3f/0x110 [ 2779.378491][ T9944] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2779.384422][ T9944] RIP: 0033:0x7f6554c7cae9 [ 2779.388862][ T9944] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2779.408508][ T9944] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2779.416959][ T9944] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2779.424965][ T9944] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2779.432970][ T9944] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2779.440973][ T9944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2779.448982][ T9944] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2779.457007][ T9944] 20:50:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x6c, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:00 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000009) [ 2779.475418][ T9944] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:00 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf801000000000000) [ 2779.583305][ T9951] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x74, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:00 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2779.784814][ T9982] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2779.825235][ T9982] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2779.834901][ T9982] CPU: 0 PID: 9982 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2779.844920][ T9982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2779.855002][ T9982] Call Trace: [ 2779.858296][ T9982] [ 2779.861241][ T9982] dump_stack_lvl+0x125/0x1b0 [ 2779.866044][ T9982] sysfs_warn_dup+0x7f/0xa0 [ 2779.870612][ T9982] sysfs_create_dir_ns+0x247/0x2a0 [ 2779.875754][ T9982] ? sysfs_create_mount_point+0xb0/0xb0 [ 2779.881326][ T9982] ? spin_bug+0x1d0/0x1d0 [ 2779.885691][ T9982] ? net_namespace+0x12/0x40 [ 2779.890314][ T9982] ? device_namespace+0x8d/0xc0 [ 2779.895206][ T9982] kobject_add_internal+0x2c8/0x960 [ 2779.900450][ T9982] kobject_add+0x16f/0x240 [ 2779.904907][ T9982] ? kset_create_and_add+0x190/0x190 [ 2779.910228][ T9982] ? do_raw_spin_unlock+0x173/0x230 [ 2779.915469][ T9982] ? kobject_put+0xbe/0x440 [ 2779.920023][ T9982] device_add+0x289/0x1aa0 [ 2779.924467][ T9982] ? device_initialize+0x510/0x510 [ 2779.929618][ T9982] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2779.936504][ T9982] ? __init_waitqueue_head+0xca/0x150 [ 2779.941929][ T9982] netdev_register_kobject+0x183/0x3f0 [ 2779.947438][ T9982] register_netdevice+0xbdf/0x14a0 [ 2779.952598][ T9982] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2779.958534][ T9982] veth_newlink+0x4ef/0xa00 [ 2779.963085][ T9982] ? veth_set_features+0x2d0/0x2d0 [ 2779.968226][ T9982] ? rtnl_create_link+0xc9c/0xfd0 [ 2779.973380][ T9982] ? __rtnl_newlink+0x108a/0x1930 [ 2779.978491][ T9982] ? rtnl_newlink+0x67/0xa0 [ 2779.983094][ T9982] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2779.988329][ T9982] ? alloc_netdev_mqs+0xee6/0x1290 [ 2779.993475][ T9982] ? rtnl_create_link+0xa6d/0xfd0 [ 2779.998536][ T9982] ? veth_set_features+0x2d0/0x2d0 [ 2780.003679][ T9982] __rtnl_newlink+0x1173/0x1930 [ 2780.008586][ T9982] ? rtnl_link_unregister+0x260/0x260 [ 2780.014003][ T9982] ? preempt_count_sub+0x150/0x150 [ 2780.019165][ T9982] rtnl_newlink+0x67/0xa0 [ 2780.023533][ T9982] ? __rtnl_newlink+0x1930/0x1930 [ 2780.028591][ T9982] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2780.033575][ T9982] ? rtnl_getlink+0xb40/0xb40 [ 2780.038390][ T9982] netlink_rcv_skb+0x16b/0x440 [ 2780.043189][ T9982] ? rtnl_getlink+0xb40/0xb40 [ 2780.047907][ T9982] ? netlink_ack+0x1370/0x1370 [ 2780.052721][ T9982] ? netlink_deliver_tap+0x1a0/0xd00 [ 2780.058042][ T9982] netlink_unicast+0x53b/0x810 [ 2780.062843][ T9982] ? netlink_attachskb+0x880/0x880 [ 2780.067980][ T9982] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2780.073900][ T9982] ? __phys_addr_symbol+0x30/0x70 [ 2780.078960][ T9982] ? __check_object_size+0x323/0x730 [ 2780.084293][ T9982] netlink_sendmsg+0x93c/0xe40 [ 2780.089097][ T9982] ? netlink_unicast+0x810/0x810 [ 2780.094067][ T9982] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2780.099381][ T9982] ? netlink_unicast+0x810/0x810 [ 2780.104355][ T9982] __sock_sendmsg+0xd5/0x180 [ 2780.108990][ T9982] ____sys_sendmsg+0x6ac/0x940 [ 2780.113788][ T9982] ? copy_msghdr_from_user+0x10b/0x160 [ 2780.119313][ T9982] ? kernel_sendmsg+0x50/0x50 [ 2780.124045][ T9982] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2780.130073][ T9982] ___sys_sendmsg+0x135/0x1d0 [ 2780.134782][ T9982] ? do_recvmmsg+0x740/0x740 [ 2780.139400][ T9982] ? find_held_lock+0x2d/0x110 [ 2780.144234][ T9982] ? __fget_light+0xe6/0x260 [ 2780.148867][ T9982] __sys_sendmsg+0x117/0x1e0 [ 2780.153488][ T9982] ? __sys_sendmsg_sock+0x30/0x30 [ 2780.158540][ T9982] ? xfd_validate_state+0x5d/0x180 [ 2780.163711][ T9982] ? syscall_enter_from_user_mode+0x26/0x80 [ 2780.169647][ T9982] do_syscall_64+0x3f/0x110 [ 2780.174175][ T9982] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2780.180106][ T9982] RIP: 0033:0x7f6554c7cae9 [ 2780.184542][ T9982] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2780.204183][ T9982] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2780.212628][ T9982] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2780.220628][ T9982] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2780.228627][ T9982] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2780.236628][ T9982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2780.244619][ T9982] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2780.252610][ T9982] [ 2780.286611][ T9982] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:00 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf900000000000000) 20:50:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x7a, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:00 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x10000000e) [ 2780.433131][ T9984] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x300, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:01 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xf901000000000000) 20:50:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x4, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x500, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b00, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x600, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2780.774646][T10002] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:01 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xfa00000000000000) [ 2780.845146][T10002] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2780.864621][T10002] CPU: 0 PID: 10002 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2780.874850][T10002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2780.884936][T10002] Call Trace: [ 2780.888244][T10002] [ 2780.891207][T10002] dump_stack_lvl+0x125/0x1b0 [ 2780.895930][T10002] sysfs_warn_dup+0x7f/0xa0 [ 2780.900480][T10002] sysfs_create_dir_ns+0x247/0x2a0 [ 2780.905627][T10002] ? sysfs_create_mount_point+0xb0/0xb0 [ 2780.911206][T10002] ? spin_bug+0x1d0/0x1d0 [ 2780.915582][T10002] ? net_namespace+0x12/0x40 [ 2780.920190][T10002] ? device_namespace+0x8d/0xc0 [ 2780.925057][T10002] kobject_add_internal+0x2c8/0x960 [ 2780.930279][T10002] kobject_add+0x16f/0x240 [ 2780.934704][T10002] ? kset_create_and_add+0x190/0x190 [ 2780.940003][T10002] ? do_raw_spin_unlock+0x173/0x230 [ 2780.945217][T10002] ? kobject_put+0xbe/0x440 [ 2780.949745][T10002] device_add+0x289/0x1aa0 [ 2780.954179][T10002] ? device_initialize+0x510/0x510 [ 2780.959302][T10002] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2780.966159][T10002] ? __init_waitqueue_head+0xca/0x150 [ 2780.971564][T10002] netdev_register_kobject+0x183/0x3f0 [ 2780.977052][T10002] register_netdevice+0xbdf/0x14a0 [ 2780.982190][T10002] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2780.988102][T10002] veth_newlink+0x4ef/0xa00 [ 2780.992623][T10002] ? veth_set_features+0x2d0/0x2d0 [ 2780.997749][T10002] ? rtnl_create_link+0xc9c/0xfd0 [ 2781.002783][T10002] ? __rtnl_newlink+0x108a/0x1930 [ 2781.007822][T10002] ? rtnl_newlink+0x67/0xa0 [ 2781.012382][T10002] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2781.017600][T10002] ? alloc_netdev_mqs+0xee6/0x1290 [ 2781.022726][T10002] ? rtnl_create_link+0xa6d/0xfd0 [ 2781.027769][T10002] ? veth_set_features+0x2d0/0x2d0 [ 2781.032886][T10002] __rtnl_newlink+0x1173/0x1930 [ 2781.037787][T10002] ? rtnl_link_unregister+0x260/0x260 [ 2781.043231][T10002] rtnl_newlink+0x67/0xa0 [ 2781.047594][T10002] ? __rtnl_newlink+0x1930/0x1930 [ 2781.052635][T10002] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2781.057593][T10002] ? rtnl_getlink+0xb40/0xb40 [ 2781.062281][T10002] ? find_held_lock+0x2d/0x110 [ 2781.067080][T10002] ? rcu_preempt_deferred_qs_irqrestore+0x684/0xdb0 [ 2781.073680][T10002] ? reacquire_held_locks+0x4b0/0x4b0 [ 2781.079073][T10002] netlink_rcv_skb+0x16b/0x440 [ 2781.083850][T10002] ? rtnl_getlink+0xb40/0xb40 [ 2781.088542][T10002] ? netlink_ack+0x1370/0x1370 [ 2781.093312][T10002] ? _raw_spin_unlock_irqrestore+0x3b/0x70 [ 2781.099145][T10002] ? __rcu_read_unlock+0x2ad/0x570 [ 2781.104269][T10002] ? netlink_deliver_tap+0x1a0/0xd00 [ 2781.109565][T10002] netlink_unicast+0x53b/0x810 [ 2781.114342][T10002] ? netlink_attachskb+0x880/0x880 [ 2781.119456][T10002] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2781.125367][T10002] ? __phys_addr_symbol+0x30/0x70 [ 2781.130414][T10002] ? __check_object_size+0x323/0x730 [ 2781.135725][T10002] netlink_sendmsg+0x93c/0xe40 [ 2781.140501][T10002] ? netlink_unicast+0x810/0x810 [ 2781.145450][T10002] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2781.150830][T10002] ? netlink_unicast+0x810/0x810 [ 2781.155785][T10002] __sock_sendmsg+0xd5/0x180 [ 2781.160391][T10002] ____sys_sendmsg+0x6ac/0x940 [ 2781.165178][T10002] ? copy_msghdr_from_user+0x10b/0x160 [ 2781.170733][T10002] ? kernel_sendmsg+0x50/0x50 [ 2781.175428][T10002] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2781.181428][T10002] ___sys_sendmsg+0x135/0x1d0 [ 2781.186111][T10002] ? do_recvmmsg+0x740/0x740 [ 2781.190710][T10002] ? find_held_lock+0x2d/0x110 [ 2781.195510][T10002] ? __fget_light+0xe6/0x260 [ 2781.200116][T10002] __sys_sendmsg+0x117/0x1e0 [ 2781.204713][T10002] ? __sys_sendmsg_sock+0x30/0x30 [ 2781.209741][T10002] ? xfd_validate_state+0x5d/0x180 [ 2781.214884][T10002] ? syscall_enter_from_user_mode+0x26/0x80 [ 2781.220794][T10002] do_syscall_64+0x3f/0x110 [ 2781.225310][T10002] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2781.231221][T10002] RIP: 0033:0x7f6554c7cae9 [ 2781.235643][T10002] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2781.255259][T10002] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2781.263677][T10002] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2781.271653][T10002] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2781.279627][T10002] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2781.287599][T10002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2781.295583][T10002] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2781.303573][T10002] 20:50:01 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x700, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:01 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000012) [ 2781.335741][T10002] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2781.387153][T10005] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x4800, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:02 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xfa01000000000000) 20:50:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x5, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x4c00, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:02 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xfb00000000000000) 20:50:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x6800, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2781.737292][T10030] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x6c00, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2781.818852][T10030] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2781.851445][T10030] CPU: 1 PID: 10030 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2781.861583][T10030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2781.871666][T10030] Call Trace: [ 2781.874966][T10030] [ 2781.877917][T10030] dump_stack_lvl+0x125/0x1b0 [ 2781.882632][T10030] sysfs_warn_dup+0x7f/0xa0 [ 2781.887184][T10030] sysfs_create_dir_ns+0x247/0x2a0 [ 2781.892405][T10030] ? sysfs_create_mount_point+0xb0/0xb0 [ 2781.897980][T10030] ? spin_bug+0x1d0/0x1d0 [ 2781.902349][T10030] ? net_namespace+0x12/0x40 [ 2781.906974][T10030] ? device_namespace+0x8d/0xc0 [ 2781.911855][T10030] kobject_add_internal+0x2c8/0x960 [ 2781.917072][T10030] kobject_add+0x16f/0x240 [ 2781.921506][T10030] ? kset_create_and_add+0x190/0x190 [ 2781.926806][T10030] ? do_raw_spin_unlock+0x173/0x230 [ 2781.932036][T10030] ? kobject_put+0xbe/0x440 [ 2781.936592][T10030] device_add+0x289/0x1aa0 [ 2781.941031][T10030] ? device_initialize+0x510/0x510 [ 2781.946161][T10030] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2781.953034][T10030] ? __init_waitqueue_head+0xca/0x150 [ 2781.958437][T10030] netdev_register_kobject+0x183/0x3f0 [ 2781.963912][T10030] register_netdevice+0xbdf/0x14a0 [ 2781.969036][T10030] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2781.975030][T10030] veth_newlink+0x4ef/0xa00 [ 2781.979545][T10030] ? veth_set_features+0x2d0/0x2d0 [ 2781.984659][T10030] ? rtnl_create_link+0xc9c/0xfd0 [ 2781.989700][T10030] ? __rtnl_newlink+0x108a/0x1930 [ 2781.994737][T10030] ? rtnl_newlink+0x67/0xa0 [ 2781.999298][T10030] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2782.004506][T10030] ? alloc_netdev_mqs+0xee6/0x1290 [ 2782.009634][T10030] ? rtnl_create_link+0xa6d/0xfd0 [ 2782.014677][T10030] ? veth_set_features+0x2d0/0x2d0 [ 2782.019797][T10030] __rtnl_newlink+0x1173/0x1930 [ 2782.024675][T10030] ? rtnl_link_unregister+0x260/0x260 [ 2782.030097][T10030] rtnl_newlink+0x67/0xa0 [ 2782.034439][T10030] ? __rtnl_newlink+0x1930/0x1930 [ 2782.039478][T10030] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2782.044432][T10030] ? rtnl_getlink+0xb40/0xb40 [ 2782.049134][T10030] netlink_rcv_skb+0x16b/0x440 [ 2782.053902][T10030] ? rtnl_getlink+0xb40/0xb40 [ 2782.058595][T10030] ? netlink_ack+0x1370/0x1370 [ 2782.063384][T10030] ? netlink_deliver_tap+0x1a0/0xd00 [ 2782.068685][T10030] netlink_unicast+0x53b/0x810 [ 2782.073459][T10030] ? netlink_attachskb+0x880/0x880 [ 2782.078572][T10030] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2782.084475][T10030] ? __phys_addr_symbol+0x30/0x70 [ 2782.089507][T10030] ? __check_object_size+0x323/0x730 [ 2782.094812][T10030] netlink_sendmsg+0x93c/0xe40 [ 2782.099589][T10030] ? netlink_unicast+0x810/0x810 [ 2782.104539][T10030] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2782.109840][T10030] ? netlink_unicast+0x810/0x810 [ 2782.114786][T10030] __sock_sendmsg+0xd5/0x180 [ 2782.119395][T10030] ____sys_sendmsg+0x6ac/0x940 [ 2782.124177][T10030] ? copy_msghdr_from_user+0x10b/0x160 [ 2782.129642][T10030] ? kernel_sendmsg+0x50/0x50 [ 2782.134342][T10030] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2782.140344][T10030] ___sys_sendmsg+0x135/0x1d0 [ 2782.145030][T10030] ? do_recvmmsg+0x740/0x740 [ 2782.149626][T10030] ? find_held_lock+0x2d/0x110 [ 2782.154430][T10030] ? __fget_light+0xe6/0x260 [ 2782.159040][T10030] __sys_sendmsg+0x117/0x1e0 [ 2782.163637][T10030] ? __sys_sendmsg_sock+0x30/0x30 [ 2782.168675][T10030] ? xfd_validate_state+0x5d/0x180 [ 2782.173907][T10030] ? syscall_enter_from_user_mode+0x26/0x80 [ 2782.179824][T10030] do_syscall_64+0x3f/0x110 [ 2782.184341][T10030] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2782.190250][T10030] RIP: 0033:0x7f6554c7cae9 [ 2782.194672][T10030] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2782.214303][T10030] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2782.222745][T10030] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2782.230737][T10030] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2782.238738][T10030] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2782.246733][T10030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2782.254726][T10030] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2782.262736][T10030] 20:50:02 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000269) [ 2782.326937][T10030] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:03 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xfb01000000000000) 20:50:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x7400, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x7a00, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2782.466432][T10033] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x6, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:03 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xfc00000000000000) 20:50:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3300, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x40000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2782.688347][T10061] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:03 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xfc01000000000000) [ 2782.794676][T10061] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2782.827686][T10061] CPU: 0 PID: 10061 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 20:50:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x800000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2782.837823][T10061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2782.847908][T10061] Call Trace: [ 2782.851212][T10061] [ 2782.854168][T10061] dump_stack_lvl+0x125/0x1b0 [ 2782.859921][T10061] sysfs_warn_dup+0x7f/0xa0 [ 2782.864475][T10061] sysfs_create_dir_ns+0x247/0x2a0 [ 2782.869623][T10061] ? sysfs_create_mount_point+0xb0/0xb0 [ 2782.875201][T10061] ? spin_bug+0x1d0/0x1d0 [ 2782.879582][T10061] ? net_namespace+0x12/0x40 [ 2782.884207][T10061] ? device_namespace+0x8d/0xc0 [ 2782.889099][T10061] kobject_add_internal+0x2c8/0x960 [ 2782.894357][T10061] kobject_add+0x16f/0x240 [ 2782.898813][T10061] ? kset_create_and_add+0x190/0x190 [ 2782.904143][T10061] ? do_raw_spin_unlock+0x173/0x230 [ 2782.909385][T10061] ? kobject_put+0xbe/0x440 [ 2782.913934][T10061] device_add+0x289/0x1aa0 [ 2782.918387][T10061] ? device_initialize+0x510/0x510 [ 2782.923540][T10061] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2782.930430][T10061] ? __init_waitqueue_head+0xca/0x150 [ 2782.935841][T10061] netdev_register_kobject+0x183/0x3f0 [ 2782.941318][T10061] register_netdevice+0xbdf/0x14a0 [ 2782.946440][T10061] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2782.952347][T10061] veth_newlink+0x4ef/0xa00 [ 2782.956879][T10061] ? veth_set_features+0x2d0/0x2d0 [ 2782.962004][T10061] ? rtnl_create_link+0xc9c/0xfd0 [ 2782.967047][T10061] ? __rtnl_newlink+0x108a/0x1930 [ 2782.972096][T10061] ? rtnl_newlink+0x67/0xa0 [ 2782.976666][T10061] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2782.981882][T10061] ? alloc_netdev_mqs+0xee6/0x1290 [ 2782.987016][T10061] ? rtnl_create_link+0xa6d/0xfd0 [ 2782.992067][T10061] ? veth_set_features+0x2d0/0x2d0 [ 2782.997187][T10061] __rtnl_newlink+0x1173/0x1930 [ 2783.002065][T10061] ? rtnl_link_unregister+0x260/0x260 [ 2783.007480][T10061] rtnl_newlink+0x67/0xa0 [ 2783.011831][T10061] ? __rtnl_newlink+0x1930/0x1930 [ 2783.016871][T10061] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2783.021830][T10061] ? rtnl_getlink+0xb40/0xb40 [ 2783.026536][T10061] netlink_rcv_skb+0x16b/0x440 [ 2783.031309][T10061] ? rtnl_getlink+0xb40/0xb40 [ 2783.036093][T10061] ? netlink_ack+0x1370/0x1370 [ 2783.040876][T10061] ? netlink_deliver_tap+0x1a0/0xd00 [ 2783.046179][T10061] netlink_unicast+0x53b/0x810 [ 2783.050953][T10061] ? netlink_attachskb+0x880/0x880 [ 2783.056069][T10061] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2783.061971][T10061] ? __phys_addr_symbol+0x30/0x70 [ 2783.067005][T10061] ? __check_object_size+0x323/0x730 [ 2783.072311][T10061] netlink_sendmsg+0x93c/0xe40 [ 2783.077094][T10061] ? netlink_unicast+0x810/0x810 [ 2783.082046][T10061] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2783.087339][T10061] ? netlink_unicast+0x810/0x810 [ 2783.092285][T10061] __sock_sendmsg+0xd5/0x180 [ 2783.096895][T10061] ____sys_sendmsg+0x6ac/0x940 [ 2783.101678][T10061] ? copy_msghdr_from_user+0x10b/0x160 [ 2783.107238][T10061] ? kernel_sendmsg+0x50/0x50 [ 2783.111937][T10061] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2783.117938][T10061] ___sys_sendmsg+0x135/0x1d0 [ 2783.122622][T10061] ? do_recvmmsg+0x740/0x740 [ 2783.127227][T10061] ? find_held_lock+0x2d/0x110 [ 2783.132024][T10061] ? __fget_light+0xe6/0x260 [ 2783.136630][T10061] __sys_sendmsg+0x117/0x1e0 [ 2783.141227][T10061] ? __sys_sendmsg_sock+0x30/0x30 [ 2783.146253][T10061] ? xfd_validate_state+0x5d/0x180 [ 2783.151394][T10061] ? syscall_enter_from_user_mode+0x26/0x80 [ 2783.157309][T10061] do_syscall_64+0x3f/0x110 [ 2783.161821][T10061] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2783.167732][T10061] RIP: 0033:0x7f6554c7cae9 [ 2783.172150][T10061] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2783.191769][T10061] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2783.200200][T10061] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2783.208181][T10061] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2783.216154][T10061] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2783.224133][T10061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2783.232105][T10061] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2783.240279][T10061] 20:50:03 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xfd00000000000000) [ 2783.254315][T10061] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:03 executing program 2: pipe(&(0x7f0000000140)) r0 = socket$netlink(0x10, 0x3, 0x9) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x80202, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f00000002c0)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff83050000071bffffff", @ANYRES32=r2, @ANYRESHEX=r2, @ANYRES64=r0], 0x4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000091) sendfile(r4, r3, 0x0, 0x100000002) [ 2783.336582][T10064] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b00, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x1000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x7, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:04 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xfd01000000000000) 20:50:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x2000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2783.513005][T10092] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2783.555101][T10092] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2783.576430][T10092] CPU: 0 PID: 10092 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2783.586587][T10092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2783.596668][T10092] Call Trace: [ 2783.599952][T10092] [ 2783.602885][T10092] dump_stack_lvl+0x125/0x1b0 [ 2783.607580][T10092] sysfs_warn_dup+0x7f/0xa0 [ 2783.612102][T10092] sysfs_create_dir_ns+0x247/0x2a0 [ 2783.617220][T10092] ? sysfs_create_mount_point+0xb0/0xb0 [ 2783.622768][T10092] ? spin_bug+0x1d0/0x1d0 [ 2783.627112][T10092] ? net_namespace+0x12/0x40 [ 2783.631710][T10092] ? device_namespace+0x8d/0xc0 [ 2783.636573][T10092] kobject_add_internal+0x2c8/0x960 [ 2783.641791][T10092] kobject_add+0x16f/0x240 [ 2783.646217][T10092] ? kset_create_and_add+0x190/0x190 [ 2783.651517][T10092] ? do_raw_spin_unlock+0x173/0x230 [ 2783.656729][T10092] ? kobject_put+0xbe/0x440 [ 2783.661251][T10092] device_add+0x289/0x1aa0 [ 2783.665674][T10092] ? device_initialize+0x510/0x510 [ 2783.670810][T10092] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2783.677669][T10092] ? __init_waitqueue_head+0xca/0x150 [ 2783.683055][T10092] netdev_register_kobject+0x183/0x3f0 [ 2783.688530][T10092] register_netdevice+0xbdf/0x14a0 [ 2783.693647][T10092] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2783.699554][T10092] veth_newlink+0x4ef/0xa00 [ 2783.704069][T10092] ? veth_set_features+0x2d0/0x2d0 [ 2783.709192][T10092] ? rtnl_create_link+0xc9c/0xfd0 [ 2783.714232][T10092] ? __rtnl_newlink+0x108a/0x1930 [ 2783.719268][T10092] ? rtnl_newlink+0x67/0xa0 [ 2783.723827][T10092] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2783.729038][T10092] ? alloc_netdev_mqs+0xee6/0x1290 [ 2783.734169][T10092] ? rtnl_create_link+0xa6d/0xfd0 [ 2783.739216][T10092] ? veth_set_features+0x2d0/0x2d0 [ 2783.744332][T10092] __rtnl_newlink+0x1173/0x1930 [ 2783.749211][T10092] ? rtnl_link_unregister+0x260/0x260 [ 2783.754621][T10092] rtnl_newlink+0x67/0xa0 [ 2783.758962][T10092] ? __rtnl_newlink+0x1930/0x1930 [ 2783.763998][T10092] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2783.768952][T10092] ? rtnl_getlink+0xb40/0xb40 [ 2783.773653][T10092] netlink_rcv_skb+0x16b/0x440 [ 2783.778425][T10092] ? rtnl_getlink+0xb40/0xb40 [ 2783.783116][T10092] ? netlink_ack+0x1370/0x1370 [ 2783.787907][T10092] ? netlink_deliver_tap+0x1a0/0xd00 [ 2783.793206][T10092] netlink_unicast+0x53b/0x810 [ 2783.797978][T10092] ? netlink_attachskb+0x880/0x880 [ 2783.803097][T10092] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2783.809003][T10092] ? __phys_addr_symbol+0x30/0x70 [ 2783.814036][T10092] ? __check_object_size+0x323/0x730 [ 2783.819357][T10092] netlink_sendmsg+0x93c/0xe40 [ 2783.824139][T10092] ? netlink_unicast+0x810/0x810 [ 2783.829094][T10092] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2783.834398][T10092] ? netlink_unicast+0x810/0x810 [ 2783.839343][T10092] __sock_sendmsg+0xd5/0x180 [ 2783.843944][T10092] ____sys_sendmsg+0x6ac/0x940 [ 2783.848725][T10092] ? copy_msghdr_from_user+0x10b/0x160 [ 2783.854187][T10092] ? kernel_sendmsg+0x50/0x50 [ 2783.858883][T10092] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2783.864892][T10092] ___sys_sendmsg+0x135/0x1d0 [ 2783.869578][T10092] ? do_recvmmsg+0x740/0x740 [ 2783.874172][T10092] ? find_held_lock+0x2d/0x110 [ 2783.878969][T10092] ? __fget_light+0xe6/0x260 [ 2783.883578][T10092] __sys_sendmsg+0x117/0x1e0 [ 2783.888259][T10092] ? __sys_sendmsg_sock+0x30/0x30 [ 2783.893289][T10092] ? xfd_validate_state+0x5d/0x180 [ 2783.898432][T10092] ? syscall_enter_from_user_mode+0x26/0x80 [ 2783.904347][T10092] do_syscall_64+0x3f/0x110 [ 2783.908863][T10092] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2783.914777][T10092] RIP: 0033:0x7f6554c7cae9 [ 2783.919218][T10092] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2783.938844][T10092] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2783.947267][T10092] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2783.955242][T10092] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2783.963240][T10092] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2783.971227][T10092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2783.979225][T10092] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2783.987230][T10092] 20:50:04 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xfe00000000000000) 20:50:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2784.052806][T10092] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x3000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x4000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x8, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:04 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xfe01000000000000) 20:50:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:04 executing program 2: pipe(&(0x7f0000000140)) r0 = socket$netlink(0x10, 0x3, 0x9) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async, rerun: 64) socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 64) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) (async, rerun: 64) r2 = socket$rxrpc(0x21, 0x2, 0xa) (rerun: 64) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async, rerun: 64) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x80202, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f00000002c0)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff83050000071bffffff", @ANYRES32=r2, @ANYRESHEX=r2, @ANYRES64=r0], 0x4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000091) sendfile(r4, r3, 0x0, 0x100000002) 20:50:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x5000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2784.438546][T10114] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' 20:50:05 executing program 2: pipe(&(0x7f0000000140)) r0 = socket$netlink(0x10, 0x3, 0x9) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) (rerun: 64) r2 = socket$rxrpc(0x21, 0x2, 0xa) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async, rerun: 32) r6 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x80202, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f00000002c0)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff83050000071bffffff", @ANYRES32=r2, @ANYRESHEX=r2, @ANYRES64=r0], 0x4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000091) (async, rerun: 32) sendfile(r4, r3, 0x0, 0x100000002) (rerun: 32) [ 2784.479928][T10114] CPU: 1 PID: 10114 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2784.490070][T10114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2784.500158][T10114] Call Trace: [ 2784.503458][T10114] [ 2784.506416][T10114] dump_stack_lvl+0x125/0x1b0 [ 2784.511136][T10114] sysfs_warn_dup+0x7f/0xa0 [ 2784.515687][T10114] sysfs_create_dir_ns+0x247/0x2a0 [ 2784.520831][T10114] ? sysfs_create_mount_point+0xb0/0xb0 20:50:05 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="0a0000012000040700ff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) [ 2784.526410][T10114] ? spin_bug+0x1d0/0x1d0 [ 2784.530782][T10114] ? net_namespace+0x12/0x40 [ 2784.535417][T10114] ? device_namespace+0x8d/0xc0 [ 2784.540309][T10114] kobject_add_internal+0x2c8/0x960 [ 2784.545563][T10114] kobject_add+0x16f/0x240 [ 2784.550045][T10114] ? kset_create_and_add+0x190/0x190 [ 2784.555369][T10114] ? do_raw_spin_unlock+0x173/0x230 [ 2784.560614][T10114] ? kobject_put+0xbe/0x440 [ 2784.565164][T10114] device_add+0x289/0x1aa0 [ 2784.569617][T10114] ? device_initialize+0x510/0x510 [ 2784.574772][T10114] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2784.581664][T10114] ? __init_waitqueue_head+0xca/0x150 [ 2784.587076][T10114] netdev_register_kobject+0x183/0x3f0 [ 2784.592553][T10114] register_netdevice+0xbdf/0x14a0 [ 2784.597680][T10114] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2784.603584][T10114] veth_newlink+0x4ef/0xa00 [ 2784.608098][T10114] ? veth_set_features+0x2d0/0x2d0 [ 2784.613212][T10114] ? rtnl_create_link+0xc9c/0xfd0 [ 2784.618245][T10114] ? __rtnl_newlink+0x108a/0x1930 [ 2784.623281][T10114] ? rtnl_newlink+0x67/0xa0 [ 2784.627844][T10114] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2784.633055][T10114] ? alloc_netdev_mqs+0xee6/0x1290 [ 2784.638185][T10114] ? rtnl_create_link+0xa6d/0xfd0 [ 2784.643227][T10114] ? veth_set_features+0x2d0/0x2d0 [ 2784.648345][T10114] __rtnl_newlink+0x1173/0x1930 [ 2784.653226][T10114] ? rtnl_link_unregister+0x260/0x260 [ 2784.658638][T10114] rtnl_newlink+0x67/0xa0 [ 2784.662979][T10114] ? __rtnl_newlink+0x1930/0x1930 [ 2784.668017][T10114] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2784.672974][T10114] ? rtnl_getlink+0xb40/0xb40 [ 2784.677679][T10114] netlink_rcv_skb+0x16b/0x440 [ 2784.682449][T10114] ? rtnl_getlink+0xb40/0xb40 [ 2784.687168][T10114] ? netlink_ack+0x1370/0x1370 [ 2784.692041][T10114] ? netlink_deliver_tap+0x1a0/0xd00 [ 2784.697349][T10114] netlink_unicast+0x53b/0x810 [ 2784.702141][T10114] ? netlink_attachskb+0x880/0x880 [ 2784.707254][T10114] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2784.713157][T10114] ? __phys_addr_symbol+0x30/0x70 [ 2784.718188][T10114] ? __check_object_size+0x323/0x730 [ 2784.723490][T10114] netlink_sendmsg+0x93c/0xe40 [ 2784.728285][T10114] ? netlink_unicast+0x810/0x810 [ 2784.733236][T10114] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2784.738531][T10114] ? netlink_unicast+0x810/0x810 [ 2784.743480][T10114] __sock_sendmsg+0xd5/0x180 [ 2784.748086][T10114] ____sys_sendmsg+0x6ac/0x940 [ 2784.752863][T10114] ? copy_msghdr_from_user+0x10b/0x160 [ 2784.758334][T10114] ? kernel_sendmsg+0x50/0x50 [ 2784.763125][T10114] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2784.769124][T10114] ___sys_sendmsg+0x135/0x1d0 [ 2784.773809][T10114] ? do_recvmmsg+0x740/0x740 [ 2784.778404][T10114] ? find_held_lock+0x2d/0x110 [ 2784.783204][T10114] ? __fget_light+0xe6/0x260 [ 2784.787809][T10114] __sys_sendmsg+0x117/0x1e0 [ 2784.792407][T10114] ? __sys_sendmsg_sock+0x30/0x30 [ 2784.797431][T10114] ? xfd_validate_state+0x5d/0x180 [ 2784.802571][T10114] ? syscall_enter_from_user_mode+0x26/0x80 [ 2784.808483][T10114] do_syscall_64+0x3f/0x110 [ 2784.813018][T10114] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2784.818953][T10114] RIP: 0033:0x7f6554c7cae9 [ 2784.823383][T10114] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2784.843005][T10114] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2784.851428][T10114] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2784.859402][T10114] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2784.867373][T10114] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 20:50:05 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xff00000000000000) [ 2784.875345][T10114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2784.883350][T10114] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2784.891351][T10114] 20:50:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x6000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2784.937546][T10114] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x7000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x8000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2785.032226][T10125] __nla_validate_parse: 2 callbacks suppressed [ 2785.032245][T10125] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x9, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5600, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:05 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xff01000000000000) 20:50:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x48000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x4c000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:05 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0xffffffff00000000) [ 2785.372988][T10156] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2785.431134][T10156] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2785.468866][T10156] CPU: 0 PID: 10156 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2785.478999][T10156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2785.489083][T10156] Call Trace: [ 2785.492391][T10156] [ 2785.495352][T10156] dump_stack_lvl+0x125/0x1b0 [ 2785.500071][T10156] sysfs_warn_dup+0x7f/0xa0 [ 2785.504641][T10156] sysfs_create_dir_ns+0x247/0x2a0 [ 2785.509785][T10156] ? sysfs_create_mount_point+0xb0/0xb0 [ 2785.515365][T10156] ? spin_bug+0x1d0/0x1d0 [ 2785.519737][T10156] ? net_namespace+0x12/0x40 [ 2785.524380][T10156] ? device_namespace+0x8d/0xc0 [ 2785.529271][T10156] kobject_add_internal+0x2c8/0x960 [ 2785.534616][T10156] kobject_add+0x16f/0x240 [ 2785.539069][T10156] ? kset_create_and_add+0x190/0x190 [ 2785.544396][T10156] ? do_raw_spin_unlock+0x173/0x230 [ 2785.549637][T10156] ? kobject_put+0xbe/0x440 [ 2785.554190][T10156] device_add+0x289/0x1aa0 [ 2785.558674][T10156] ? device_initialize+0x510/0x510 [ 2785.563824][T10156] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2785.570709][T10156] ? __init_waitqueue_head+0xca/0x150 [ 2785.576137][T10156] netdev_register_kobject+0x183/0x3f0 [ 2785.581640][T10156] register_netdevice+0xbdf/0x14a0 [ 2785.586790][T10156] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2785.592725][T10156] veth_newlink+0x4ef/0xa00 [ 2785.597266][T10156] ? veth_set_features+0x2d0/0x2d0 [ 2785.602410][T10156] ? rtnl_create_link+0xc9c/0xfd0 [ 2785.607471][T10156] ? __rtnl_newlink+0x108a/0x1930 [ 2785.612535][T10156] ? rtnl_newlink+0x67/0xa0 [ 2785.617141][T10156] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2785.622378][T10156] ? alloc_netdev_mqs+0xee6/0x1290 [ 2785.627530][T10156] ? rtnl_create_link+0xa6d/0xfd0 [ 2785.632595][T10156] ? veth_set_features+0x2d0/0x2d0 [ 2785.637746][T10156] __rtnl_newlink+0x1173/0x1930 [ 2785.642654][T10156] ? rtnl_link_unregister+0x260/0x260 [ 2785.648109][T10156] rtnl_newlink+0x67/0xa0 [ 2785.652498][T10156] ? __rtnl_newlink+0x1930/0x1930 [ 2785.657564][T10156] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2785.662551][T10156] ? rtnl_getlink+0xb40/0xb40 [ 2785.667286][T10156] netlink_rcv_skb+0x16b/0x440 [ 2785.672099][T10156] ? rtnl_getlink+0xb40/0xb40 [ 2785.676817][T10156] ? netlink_ack+0x1370/0x1370 [ 2785.681633][T10156] ? netlink_deliver_tap+0x1a0/0xd00 [ 2785.686959][T10156] netlink_unicast+0x53b/0x810 [ 2785.691760][T10156] ? netlink_attachskb+0x880/0x880 [ 2785.696902][T10156] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2785.702830][T10156] ? __phys_addr_symbol+0x30/0x70 [ 2785.707888][T10156] ? __check_object_size+0x323/0x730 [ 2785.713223][T10156] netlink_sendmsg+0x93c/0xe40 [ 2785.718022][T10156] ? netlink_unicast+0x810/0x810 [ 2785.722997][T10156] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2785.728319][T10156] ? netlink_unicast+0x810/0x810 [ 2785.733288][T10156] __sock_sendmsg+0xd5/0x180 [ 2785.737927][T10156] ____sys_sendmsg+0x6ac/0x940 [ 2785.742731][T10156] ? copy_msghdr_from_user+0x10b/0x160 [ 2785.748220][T10156] ? kernel_sendmsg+0x50/0x50 [ 2785.752948][T10156] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2785.758979][T10156] ___sys_sendmsg+0x135/0x1d0 [ 2785.763692][T10156] ? do_recvmmsg+0x740/0x740 [ 2785.768317][T10156] ? find_held_lock+0x2d/0x110 [ 2785.773161][T10156] ? __fget_light+0xe6/0x260 [ 2785.777806][T10156] __sys_sendmsg+0x117/0x1e0 [ 2785.782445][T10156] ? __sys_sendmsg_sock+0x30/0x30 [ 2785.787508][T10156] ? xfd_validate_state+0x5d/0x180 [ 2785.792682][T10156] ? syscall_enter_from_user_mode+0x26/0x80 [ 2785.798625][T10156] do_syscall_64+0x3f/0x110 [ 2785.803161][T10156] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2785.809097][T10156] RIP: 0033:0x7f6554c7cae9 [ 2785.813547][T10156] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2785.833204][T10156] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2785.841660][T10156] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2785.849668][T10156] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2785.857673][T10156] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2785.865678][T10156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2785.873675][T10156] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 20:50:06 executing program 2: pipe(&(0x7f0000000140)) (async) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="0a0000012000040700ff", @ANYRES32=r1], 0x4}}, 0x0) (async) sendfile(r3, r2, 0x0, 0x100000002) 20:50:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x68000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:06 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01}}, './file0\x00'}) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) r1 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) [ 2785.881696][T10156] 20:50:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x6c000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2785.926081][T10156] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2785.969814][T10159] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0xa, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:06 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01}}, './file0\x00'}) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) r1 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r1, 0x0) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) 20:50:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x74000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x7a000000, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2786.146473][T10185] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2786.225191][T10185] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2786.267721][T10185] CPU: 0 PID: 10185 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2786.277857][T10185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2786.287944][T10185] Call Trace: [ 2786.291333][T10185] [ 2786.294283][T10185] dump_stack_lvl+0x125/0x1b0 [ 2786.299002][T10185] sysfs_warn_dup+0x7f/0xa0 [ 2786.303546][T10185] sysfs_create_dir_ns+0x247/0x2a0 [ 2786.308690][T10185] ? sysfs_create_mount_point+0xb0/0xb0 20:50:06 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async, rerun: 64) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) (async) r1 = socket$rxrpc(0x21, 0x2, 0xa) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async, rerun: 64) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="0a0000012000040700ff", @ANYRES32=r1], 0x4}}, 0x0) (async) sendfile(r3, r2, 0x0, 0x100000002) 20:50:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x7ffffff7, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2786.314266][T10185] ? spin_bug+0x1d0/0x1d0 [ 2786.318664][T10185] ? net_namespace+0x12/0x40 [ 2786.323297][T10185] ? device_namespace+0x8d/0xc0 [ 2786.328190][T10185] kobject_add_internal+0x2c8/0x960 [ 2786.333437][T10185] kobject_add+0x16f/0x240 [ 2786.337893][T10185] ? kset_create_and_add+0x190/0x190 [ 2786.343216][T10185] ? do_raw_spin_unlock+0x173/0x230 [ 2786.348466][T10185] ? kobject_put+0xbe/0x440 [ 2786.353016][T10185] device_add+0x289/0x1aa0 [ 2786.357464][T10185] ? device_initialize+0x510/0x510 [ 2786.362624][T10185] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2786.369513][T10185] ? __init_waitqueue_head+0xca/0x150 [ 2786.374934][T10185] netdev_register_kobject+0x183/0x3f0 [ 2786.380433][T10185] register_netdevice+0xbdf/0x14a0 [ 2786.385583][T10185] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2786.391518][T10185] veth_newlink+0x4ef/0xa00 [ 2786.396056][T10185] ? veth_set_features+0x2d0/0x2d0 [ 2786.401197][T10185] ? rtnl_create_link+0xc9c/0xfd0 [ 2786.406257][T10185] ? __rtnl_newlink+0x108a/0x1930 [ 2786.411322][T10185] ? rtnl_newlink+0x67/0xa0 [ 2786.415920][T10185] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2786.421163][T10185] ? alloc_netdev_mqs+0xee6/0x1290 [ 2786.426312][T10185] ? rtnl_create_link+0xa6d/0xfd0 [ 2786.431376][T10185] ? veth_set_features+0x2d0/0x2d0 [ 2786.436522][T10185] __rtnl_newlink+0x1173/0x1930 [ 2786.441432][T10185] ? rtnl_link_unregister+0x260/0x260 [ 2786.446884][T10185] rtnl_newlink+0x67/0xa0 [ 2786.451247][T10185] ? __rtnl_newlink+0x1930/0x1930 [ 2786.456307][T10185] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2786.461287][T10185] ? rtnl_getlink+0xb40/0xb40 [ 2786.466022][T10185] netlink_rcv_skb+0x16b/0x440 [ 2786.470905][T10185] ? rtnl_getlink+0xb40/0xb40 [ 2786.475624][T10185] ? netlink_ack+0x1370/0x1370 [ 2786.480439][T10185] ? netlink_deliver_tap+0x1a0/0xd00 [ 2786.485759][T10185] netlink_unicast+0x53b/0x810 [ 2786.490561][T10185] ? netlink_attachskb+0x880/0x880 [ 2786.495706][T10185] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2786.501635][T10185] ? __phys_addr_symbol+0x30/0x70 [ 2786.506704][T10185] ? __check_object_size+0x323/0x730 [ 2786.512036][T10185] netlink_sendmsg+0x93c/0xe40 20:50:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0xf7ffff7f, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2786.516844][T10185] ? netlink_unicast+0x810/0x810 [ 2786.521825][T10185] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2786.527143][T10185] ? netlink_unicast+0x810/0x810 [ 2786.532107][T10185] __sock_sendmsg+0xd5/0x180 [ 2786.536732][T10185] ____sys_sendmsg+0x6ac/0x940 [ 2786.541554][T10185] ? copy_msghdr_from_user+0x10b/0x160 [ 2786.547047][T10185] ? kernel_sendmsg+0x50/0x50 [ 2786.551774][T10185] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2786.557801][T10185] ___sys_sendmsg+0x135/0x1d0 [ 2786.562513][T10185] ? do_recvmmsg+0x740/0x740 [ 2786.567140][T10185] ? find_held_lock+0x2d/0x110 [ 2786.571974][T10185] ? __fget_light+0xe6/0x260 [ 2786.576604][T10185] __sys_sendmsg+0x117/0x1e0 [ 2786.581227][T10185] ? __sys_sendmsg_sock+0x30/0x30 [ 2786.586276][T10185] ? xfd_validate_state+0x5d/0x180 [ 2786.591446][T10185] ? syscall_enter_from_user_mode+0x26/0x80 [ 2786.597387][T10185] do_syscall_64+0x3f/0x110 [ 2786.601928][T10185] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2786.607863][T10185] RIP: 0033:0x7f6554c7cae9 20:50:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0xffffff7f, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2786.612306][T10185] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2786.631944][T10185] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2786.640399][T10185] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2786.648489][T10185] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2786.656491][T10185] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 20:50:07 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:50:07 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01}}, './file0\x00'}) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) r1 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r1, 0x0) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) [ 2786.664494][T10185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2786.672491][T10185] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2786.680530][T10185] [ 2786.773216][T10185] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2786.833874][T10188] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:07 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) r2 = getpgrp(r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4, 0x3, 0x7, 0x2, 0x200, r2}) 20:50:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0xb, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c010000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:07 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) r2 = getpgrp(r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4, 0x3, 0x7, 0x2, 0x200, r2}) 20:50:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x2}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2787.060519][T10227] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x3}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2787.135930][T10227] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2787.202709][T10227] CPU: 0 PID: 10227 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2787.212846][T10227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2787.222933][T10227] Call Trace: [ 2787.226239][T10227] [ 2787.229188][T10227] dump_stack_lvl+0x125/0x1b0 [ 2787.233908][T10227] sysfs_warn_dup+0x7f/0xa0 [ 2787.238449][T10227] sysfs_create_dir_ns+0x247/0x2a0 [ 2787.243568][T10227] ? sysfs_create_mount_point+0xb0/0xb0 [ 2787.249122][T10227] ? spin_bug+0x1d0/0x1d0 [ 2787.253468][T10227] ? net_namespace+0x12/0x40 [ 2787.258072][T10227] ? device_namespace+0x8d/0xc0 [ 2787.263031][T10227] kobject_add_internal+0x2c8/0x960 [ 2787.268246][T10227] kobject_add+0x16f/0x240 [ 2787.272673][T10227] ? kset_create_and_add+0x190/0x190 [ 2787.277968][T10227] ? do_raw_spin_unlock+0x173/0x230 [ 2787.283183][T10227] ? kobject_put+0xbe/0x440 [ 2787.287713][T10227] device_add+0x289/0x1aa0 [ 2787.292233][T10227] ? device_initialize+0x510/0x510 [ 2787.297356][T10227] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2787.304221][T10227] ? __init_waitqueue_head+0xca/0x150 [ 2787.309784][T10227] netdev_register_kobject+0x183/0x3f0 [ 2787.315259][T10227] register_netdevice+0xbdf/0x14a0 [ 2787.320379][T10227] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2787.326285][T10227] veth_newlink+0x4ef/0xa00 [ 2787.330796][T10227] ? veth_set_features+0x2d0/0x2d0 [ 2787.335910][T10227] ? rtnl_create_link+0xc9c/0xfd0 [ 2787.340942][T10227] ? __rtnl_newlink+0x108a/0x1930 [ 2787.345986][T10227] ? rtnl_newlink+0x67/0xa0 [ 2787.350549][T10227] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2787.355848][T10227] ? alloc_netdev_mqs+0xee6/0x1290 [ 2787.360971][T10227] ? rtnl_create_link+0xa6d/0xfd0 [ 2787.366012][T10227] ? veth_set_features+0x2d0/0x2d0 [ 2787.371126][T10227] __rtnl_newlink+0x1173/0x1930 [ 2787.376001][T10227] ? rtnl_link_unregister+0x260/0x260 [ 2787.381413][T10227] rtnl_newlink+0x67/0xa0 [ 2787.385754][T10227] ? __rtnl_newlink+0x1930/0x1930 [ 2787.390792][T10227] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2787.395747][T10227] ? rtnl_getlink+0xb40/0xb40 [ 2787.400451][T10227] netlink_rcv_skb+0x16b/0x440 [ 2787.405224][T10227] ? rtnl_getlink+0xb40/0xb40 [ 2787.410262][T10227] ? netlink_ack+0x1370/0x1370 [ 2787.415048][T10227] ? netlink_deliver_tap+0x1a0/0xd00 [ 2787.420347][T10227] netlink_unicast+0x53b/0x810 [ 2787.425122][T10227] ? netlink_attachskb+0x880/0x880 [ 2787.430236][T10227] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2787.436142][T10227] ? __phys_addr_symbol+0x30/0x70 [ 2787.441173][T10227] ? __check_object_size+0x323/0x730 [ 2787.446476][T10227] netlink_sendmsg+0x93c/0xe40 [ 2787.451252][T10227] ? netlink_unicast+0x810/0x810 [ 2787.456199][T10227] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2787.461488][T10227] ? netlink_unicast+0x810/0x810 [ 2787.466430][T10227] __sock_sendmsg+0xd5/0x180 [ 2787.471035][T10227] ____sys_sendmsg+0x6ac/0x940 [ 2787.475813][T10227] ? copy_msghdr_from_user+0x10b/0x160 [ 2787.481274][T10227] ? kernel_sendmsg+0x50/0x50 [ 2787.485967][T10227] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2787.491965][T10227] ___sys_sendmsg+0x135/0x1d0 [ 2787.496654][T10227] ? do_recvmmsg+0x740/0x740 [ 2787.501258][T10227] ? find_held_lock+0x2d/0x110 [ 2787.506058][T10227] ? __fget_light+0xe6/0x260 [ 2787.510666][T10227] __sys_sendmsg+0x117/0x1e0 [ 2787.515263][T10227] ? __sys_sendmsg_sock+0x30/0x30 [ 2787.520287][T10227] ? xfd_validate_state+0x5d/0x180 [ 2787.525436][T10227] ? syscall_enter_from_user_mode+0x26/0x80 [ 2787.531358][T10227] do_syscall_64+0x3f/0x110 [ 2787.535871][T10227] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2787.541777][T10227] RIP: 0033:0x7f6554c7cae9 [ 2787.546196][T10227] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2787.565809][T10227] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2787.574227][T10227] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2787.582199][T10227] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2787.590171][T10227] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2787.598143][T10227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2787.606118][T10227] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2787.614119][T10227] 20:50:08 executing program 2: pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:50:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x4}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2787.644270][T10227] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:08 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) r2 = getpgrp(r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4, 0x3, 0x7, 0x2, 0x200, r2}) memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) getpgrp(r1) (async) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4, 0x3, 0x7, 0x2, 0x200, r2}) (async) 20:50:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x5}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2787.799223][T10236] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:08 executing program 0: r0 = memfd_create(&(0x7f0000000fc0)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x00\x00\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\x03\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9\x83it\xe3CaU\xac\xb8\x15Cn\xd4\xa47V\'+\xcc\xbf\r\xa9lK\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xd4sl\x84\x90\xdc\x03\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbdq\x828\xcbG\xae\a\r&\x8f\xbf\xff\xca\xf9\xad?\x1e\xfco\xca eD\x19\xabp\xa7o\xcb\x961MR\xb9&<\xec\xcc3)\xc3d\xe9\xa7\xe3)R\xbf\xf1\x0e\xbb\xe5P\xd8s0\x17\xb4\x80\xdaM\xcd\xfd\xce\x92\xf4z[5\xa6\xfd\xf5\xb4\xf0$:\xc3d\x14\x9b\x84`\xa7\x8b\xf3\xb1\x8aC0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 32) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) (async, rerun: 32) sendfile(r3, r2, 0x0, 0x100000002) 20:50:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x6}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2788.041943][T10260] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x7}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2788.121353][T10260] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2788.150136][T10260] CPU: 0 PID: 10260 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2788.160266][T10260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 20:50:08 executing program 0: r0 = memfd_create(&(0x7f0000000fc0)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x00\x00\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\x03\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9\x83it\xe3CaU\xac\xb8\x15Cn\xd4\xa47V\'+\xcc\xbf\r\xa9lK\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xd4sl\x84\x90\xdc\x03\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbdq\x828\xcbG\xae\a\r&\x8f\xbf\xff\xca\xf9\xad?\x1e\xfco\xca eD\x19\xabp\xa7o\xcb\x961MR\xb9&<\xec\xcc3)\xc3d\xe9\xa7\xe3)R\xbf\xf1\x0e\xbb\xe5P\xd8s0\x17\xb4\x80\xdaM\xcd\xfd\xce\x92\xf4z[5\xa6\xfd\xf5\xb4\xf0$:\xc3d\x14\x9b\x84`\xa7\x8b\xf3\xb1\x8aC [ 2788.176699][T10260] dump_stack_lvl+0x125/0x1b0 [ 2788.181418][T10260] sysfs_warn_dup+0x7f/0xa0 [ 2788.185966][T10260] sysfs_create_dir_ns+0x247/0x2a0 [ 2788.191120][T10260] ? sysfs_create_mount_point+0xb0/0xb0 [ 2788.196699][T10260] ? spin_bug+0x1d0/0x1d0 [ 2788.201075][T10260] ? net_namespace+0x12/0x40 [ 2788.205708][T10260] ? device_namespace+0x8d/0xc0 [ 2788.210598][T10260] kobject_add_internal+0x2c8/0x960 [ 2788.215844][T10260] kobject_add+0x16f/0x240 [ 2788.220294][T10260] ? kset_create_and_add+0x190/0x190 [ 2788.225616][T10260] ? do_raw_spin_unlock+0x173/0x230 [ 2788.230852][T10260] ? kobject_put+0xbe/0x440 [ 2788.235414][T10260] device_add+0x289/0x1aa0 [ 2788.239862][T10260] ? device_initialize+0x510/0x510 [ 2788.245013][T10260] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2788.251898][T10260] ? __init_waitqueue_head+0xca/0x150 [ 2788.257305][T10260] netdev_register_kobject+0x183/0x3f0 [ 2788.262784][T10260] register_netdevice+0xbdf/0x14a0 [ 2788.267906][T10260] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2788.273809][T10260] veth_newlink+0x4ef/0xa00 [ 2788.278322][T10260] ? veth_set_features+0x2d0/0x2d0 [ 2788.283435][T10260] ? rtnl_create_link+0xc9c/0xfd0 [ 2788.288469][T10260] ? __rtnl_newlink+0x108a/0x1930 [ 2788.293505][T10260] ? rtnl_newlink+0x67/0xa0 [ 2788.298073][T10260] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2788.303282][T10260] ? alloc_netdev_mqs+0xee6/0x1290 [ 2788.308942][T10260] ? rtnl_create_link+0xa6d/0xfd0 [ 2788.313983][T10260] ? veth_set_features+0x2d0/0x2d0 [ 2788.319102][T10260] __rtnl_newlink+0x1173/0x1930 [ 2788.323991][T10260] ? rtnl_link_unregister+0x260/0x260 [ 2788.329407][T10260] rtnl_newlink+0x67/0xa0 [ 2788.333748][T10260] ? __rtnl_newlink+0x1930/0x1930 [ 2788.338783][T10260] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2788.343737][T10260] ? rtnl_getlink+0xb40/0xb40 [ 2788.348474][T10260] netlink_rcv_skb+0x16b/0x440 [ 2788.353246][T10260] ? rtnl_getlink+0xb40/0xb40 [ 2788.357938][T10260] ? netlink_ack+0x1370/0x1370 [ 2788.362719][T10260] ? netlink_deliver_tap+0x1a0/0xd00 [ 2788.368015][T10260] netlink_unicast+0x53b/0x810 [ 2788.372791][T10260] ? netlink_attachskb+0x880/0x880 [ 2788.377911][T10260] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2788.383812][T10260] ? __phys_addr_symbol+0x30/0x70 [ 2788.388845][T10260] ? __check_object_size+0x323/0x730 [ 2788.394152][T10260] netlink_sendmsg+0x93c/0xe40 [ 2788.398926][T10260] ? netlink_unicast+0x810/0x810 [ 2788.403872][T10260] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2788.409164][T10260] ? netlink_unicast+0x810/0x810 [ 2788.414120][T10260] __sock_sendmsg+0xd5/0x180 [ 2788.418736][T10260] ____sys_sendmsg+0x6ac/0x940 [ 2788.423520][T10260] ? copy_msghdr_from_user+0x10b/0x160 [ 2788.428984][T10260] ? kernel_sendmsg+0x50/0x50 [ 2788.433682][T10260] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2788.439683][T10260] ___sys_sendmsg+0x135/0x1d0 [ 2788.444370][T10260] ? do_recvmmsg+0x740/0x740 [ 2788.448965][T10260] ? find_held_lock+0x2d/0x110 [ 2788.453762][T10260] ? __fget_light+0xe6/0x260 [ 2788.458399][T10260] __sys_sendmsg+0x117/0x1e0 [ 2788.462997][T10260] ? __sys_sendmsg_sock+0x30/0x30 [ 2788.468026][T10260] ? xfd_validate_state+0x5d/0x180 [ 2788.473168][T10260] ? syscall_enter_from_user_mode+0x26/0x80 [ 2788.479077][T10260] do_syscall_64+0x3f/0x110 [ 2788.483587][T10260] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2788.489493][T10260] RIP: 0033:0x7f6554c7cae9 [ 2788.493915][T10260] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2788.513530][T10260] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2788.521950][T10260] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2788.529927][T10260] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2788.537986][T10260] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2788.545957][T10260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2788.553928][T10260] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2788.562438][T10260] 20:50:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x48}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2788.590129][T10260] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:09 executing program 0: r0 = memfd_create(&(0x7f0000000fc0)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x00\x00\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\x03\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9\x83it\xe3CaU\xac\xb8\x15Cn\xd4\xa47V\'+\xcc\xbf\r\xa9lK\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xd4sl\x84\x90\xdc\x03\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbdq\x828\xcbG\xae\a\r&\x8f\xbf\xff\xca\xf9\xad?\x1e\xfco\xca eD\x19\xabp\xa7o\xcb\x961MR\xb9&<\xec\xcc3)\xc3d\xe9\xa7\xe3)R\xbf\xf1\x0e\xbb\xe5P\xd8s0\x17\xb4\x80\xdaM\xcd\xfd\xce\x92\xf4z[5\xa6\xfd\xf5\xb4\xf0$:\xc3d\x14\x9b\x84`\xa7\x8b\xf3\xb1\x8aC0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0xe, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:09 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f00000000c0)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ff00007cd739081102039d14ef6866a91ca6ecc4fed39f232813bbaa11f404502ee48ec148f83fc51c87a8eb28832dfe9f", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 20:50:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x68}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2030000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2788.833823][T10294] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:09 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) r1 = syz_io_uring_setup(0x1a7f, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r3, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}) syz_io_uring_setup(0x1a7f, &(0x7f0000000080)={0x0, 0x0, 0x10100, 0x0, 0x0, 0x0, r1}, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r5, r4, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}) syz_io_uring_setup(0x1a7f, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r7, r6, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}) syz_io_uring_complete(r7) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0xffffd000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2788.908428][T10294] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2788.969831][T10294] CPU: 0 PID: 10294 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2788.979970][T10294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2788.990063][T10294] Call Trace: [ 2788.993371][T10294] [ 2788.996331][T10294] dump_stack_lvl+0x125/0x1b0 [ 2789.001056][T10294] sysfs_warn_dup+0x7f/0xa0 [ 2789.005607][T10294] sysfs_create_dir_ns+0x247/0x2a0 [ 2789.010749][T10294] ? sysfs_create_mount_point+0xb0/0xb0 [ 2789.016338][T10294] ? spin_bug+0x1d0/0x1d0 [ 2789.020715][T10294] ? net_namespace+0x12/0x40 [ 2789.025346][T10294] ? device_namespace+0x8d/0xc0 [ 2789.030218][T10294] kobject_add_internal+0x2c8/0x960 [ 2789.035440][T10294] kobject_add+0x16f/0x240 [ 2789.039866][T10294] ? kset_create_and_add+0x190/0x190 [ 2789.045191][T10294] ? do_raw_spin_unlock+0x173/0x230 [ 2789.050405][T10294] ? kobject_put+0xbe/0x440 [ 2789.054959][T10294] device_add+0x289/0x1aa0 [ 2789.061306][T10294] ? device_initialize+0x510/0x510 [ 2789.066429][T10294] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2789.073291][T10294] ? __init_waitqueue_head+0xca/0x150 [ 2789.078678][T10294] netdev_register_kobject+0x183/0x3f0 [ 2789.084146][T10294] register_netdevice+0xbdf/0x14a0 [ 2789.089264][T10294] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2789.095196][T10294] veth_newlink+0x4ef/0xa00 [ 2789.099710][T10294] ? veth_set_features+0x2d0/0x2d0 [ 2789.104826][T10294] ? rtnl_create_link+0xc9c/0xfd0 [ 2789.109858][T10294] ? __rtnl_newlink+0x108a/0x1930 [ 2789.114898][T10294] ? rtnl_newlink+0x67/0xa0 [ 2789.119460][T10294] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2789.124668][T10294] ? alloc_netdev_mqs+0xee6/0x1290 [ 2789.129793][T10294] ? rtnl_create_link+0xa6d/0xfd0 [ 2789.134837][T10294] ? veth_set_features+0x2d0/0x2d0 [ 2789.139953][T10294] __rtnl_newlink+0x1173/0x1930 [ 2789.144835][T10294] ? rtnl_link_unregister+0x260/0x260 [ 2789.150249][T10294] rtnl_newlink+0x67/0xa0 [ 2789.154591][T10294] ? __rtnl_newlink+0x1930/0x1930 [ 2789.159627][T10294] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2789.164581][T10294] ? rtnl_getlink+0xb40/0xb40 [ 2789.169285][T10294] netlink_rcv_skb+0x16b/0x440 [ 2789.174052][T10294] ? rtnl_getlink+0xb40/0xb40 [ 2789.178757][T10294] ? netlink_ack+0x1370/0x1370 [ 2789.183544][T10294] ? netlink_deliver_tap+0x1a0/0xd00 [ 2789.188842][T10294] netlink_unicast+0x53b/0x810 [ 2789.193615][T10294] ? netlink_attachskb+0x880/0x880 [ 2789.198728][T10294] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2789.204629][T10294] ? __phys_addr_symbol+0x30/0x70 [ 2789.209930][T10294] ? __check_object_size+0x323/0x730 [ 2789.215233][T10294] netlink_sendmsg+0x93c/0xe40 [ 2789.220011][T10294] ? netlink_unicast+0x810/0x810 [ 2789.224959][T10294] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2789.230254][T10294] ? netlink_unicast+0x810/0x810 [ 2789.235197][T10294] __sock_sendmsg+0xd5/0x180 [ 2789.239806][T10294] ____sys_sendmsg+0x6ac/0x940 [ 2789.244586][T10294] ? copy_msghdr_from_user+0x10b/0x160 [ 2789.250050][T10294] ? kernel_sendmsg+0x50/0x50 [ 2789.254746][T10294] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2789.260745][T10294] ___sys_sendmsg+0x135/0x1d0 [ 2789.265499][T10294] ? do_recvmmsg+0x740/0x740 [ 2789.270180][T10294] ? find_held_lock+0x2d/0x110 [ 2789.274978][T10294] ? __fget_light+0xe6/0x260 [ 2789.279588][T10294] __sys_sendmsg+0x117/0x1e0 [ 2789.284183][T10294] ? __sys_sendmsg_sock+0x30/0x30 [ 2789.289206][T10294] ? xfd_validate_state+0x5d/0x180 [ 2789.294355][T10294] ? syscall_enter_from_user_mode+0x26/0x80 [ 2789.300264][T10294] do_syscall_64+0x3f/0x110 [ 2789.304862][T10294] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2789.310770][T10294] RIP: 0033:0x7f6554c7cae9 [ 2789.315200][T10294] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2789.334813][T10294] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2789.343232][T10294] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2789.351206][T10294] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2789.359193][T10294] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2789.367265][T10294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2789.375245][T10294] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2789.383244][T10294] [ 2789.404267][T10294] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x6c}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:10 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) r1 = syz_io_uring_setup(0x1a7f, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) (async) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r3, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}) syz_io_uring_setup(0x1a7f, &(0x7f0000000080)={0x0, 0x0, 0x10100, 0x0, 0x0, 0x0, r1}, &(0x7f0000000100), &(0x7f0000000140)=0x0) (async) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r5, r4, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}) (async) syz_io_uring_setup(0x1a7f, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) (async) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r7, r6, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}) syz_io_uring_complete(r7) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0xffffd000) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:50:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x74}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0xf, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x7a}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0030000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2789.742755][T10326] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2789.770740][T10326] CPU: 0 PID: 10326 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2789.780875][T10326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2789.791407][T10326] Call Trace: [ 2789.794707][T10326] [ 2789.797659][T10326] dump_stack_lvl+0x125/0x1b0 [ 2789.802379][T10326] sysfs_warn_dup+0x7f/0xa0 [ 2789.806928][T10326] sysfs_create_dir_ns+0x247/0x2a0 [ 2789.812075][T10326] ? sysfs_create_mount_point+0xb0/0xb0 [ 2789.817654][T10326] ? spin_bug+0x1d0/0x1d0 [ 2789.822025][T10326] ? net_namespace+0x12/0x40 [ 2789.826650][T10326] ? device_namespace+0x8d/0xc0 [ 2789.831540][T10326] kobject_add_internal+0x2c8/0x960 [ 2789.836781][T10326] kobject_add+0x16f/0x240 [ 2789.841234][T10326] ? kset_create_and_add+0x190/0x190 [ 2789.846558][T10326] ? do_raw_spin_unlock+0x173/0x230 [ 2789.851800][T10326] ? kobject_put+0xbe/0x440 [ 2789.856357][T10326] device_add+0x289/0x1aa0 [ 2789.860807][T10326] ? device_initialize+0x510/0x510 [ 2789.865957][T10326] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2789.872845][T10326] ? __init_waitqueue_head+0xca/0x150 [ 2789.878267][T10326] netdev_register_kobject+0x183/0x3f0 [ 2789.883769][T10326] register_netdevice+0xbdf/0x14a0 [ 2789.888919][T10326] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2789.894855][T10326] veth_newlink+0x4ef/0xa00 [ 2789.899405][T10326] ? veth_set_features+0x2d0/0x2d0 [ 2789.904545][T10326] ? rtnl_create_link+0xc9c/0xfd0 [ 2789.909687][T10326] ? __rtnl_newlink+0x108a/0x1930 [ 2789.914749][T10326] ? rtnl_newlink+0x67/0xa0 [ 2789.919346][T10326] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2789.924578][T10326] ? alloc_netdev_mqs+0xee6/0x1290 [ 2789.929740][T10326] ? rtnl_create_link+0xa6d/0xfd0 [ 2789.934811][T10326] ? veth_set_features+0x2d0/0x2d0 20:50:10 executing program 2: pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) socket$inet6_dccp(0xa, 0x6, 0x0) (async) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f00000000c0)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ff00007cd739081102039d14ef6866a91ca6ecc4fed39f232813bbaa11f404502ee48ec148f83fc51c87a8eb28832dfe9f", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) [ 2789.939962][T10326] __rtnl_newlink+0x1173/0x1930 [ 2789.944869][T10326] ? rtnl_link_unregister+0x260/0x260 [ 2789.950324][T10326] rtnl_newlink+0x67/0xa0 [ 2789.954694][T10326] ? __rtnl_newlink+0x1930/0x1930 [ 2789.959758][T10326] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2789.964742][T10326] ? rtnl_getlink+0xb40/0xb40 [ 2789.969477][T10326] netlink_rcv_skb+0x16b/0x440 [ 2789.974274][T10326] ? rtnl_getlink+0xb40/0xb40 [ 2789.978995][T10326] ? netlink_ack+0x1370/0x1370 [ 2789.983810][T10326] ? netlink_deliver_tap+0x1a0/0xd00 [ 2789.989138][T10326] netlink_unicast+0x53b/0x810 [ 2789.993946][T10326] ? netlink_attachskb+0x880/0x880 [ 2789.999088][T10326] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2790.005017][T10326] ? __phys_addr_symbol+0x30/0x70 [ 2790.010101][T10326] ? __check_object_size+0x323/0x730 [ 2790.015518][T10326] netlink_sendmsg+0x93c/0xe40 [ 2790.020326][T10326] ? netlink_unicast+0x810/0x810 [ 2790.025303][T10326] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2790.030618][T10326] ? netlink_unicast+0x810/0x810 [ 2790.035589][T10326] __sock_sendmsg+0xd5/0x180 [ 2790.040217][T10326] ____sys_sendmsg+0x6ac/0x940 [ 2790.045016][T10326] ? copy_msghdr_from_user+0x10b/0x160 [ 2790.050537][T10326] ? kernel_sendmsg+0x50/0x50 [ 2790.055266][T10326] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2790.061298][T10326] ___sys_sendmsg+0x135/0x1d0 [ 2790.066024][T10326] ? do_recvmmsg+0x740/0x740 [ 2790.070652][T10326] ? find_held_lock+0x2d/0x110 [ 2790.075495][T10326] ? __fget_light+0xe6/0x260 [ 2790.080129][T10326] __sys_sendmsg+0x117/0x1e0 [ 2790.084752][T10326] ? __sys_sendmsg_sock+0x30/0x30 [ 2790.089888][T10326] ? xfd_validate_state+0x5d/0x180 [ 2790.095062][T10326] ? syscall_enter_from_user_mode+0x26/0x80 [ 2790.101008][T10326] do_syscall_64+0x3f/0x110 [ 2790.105883][T10326] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2790.111824][T10326] RIP: 0033:0x7f6554c7cae9 [ 2790.116270][T10326] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2790.135920][T10326] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:50:10 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) (async) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$rxrpc(0x21, 0x2, 0xa) (async) r2 = socket$rxrpc(0x21, 0x2, 0xa) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f00000000c0)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ff00007cd739081102039d14ef6866a91ca6ecc4fed39f232813bbaa11f404502ee48ec148f83fc51c87a8eb28832dfe9f", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) (async) sendfile(r4, r3, 0x0, 0x100000002) 20:50:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2790.144384][T10326] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2790.152392][T10326] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2790.160401][T10326] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2790.168403][T10326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2790.176404][T10326] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2790.184424][T10326] 20:50:10 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) r1 = syz_io_uring_setup(0x1a7f, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r3, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}) syz_io_uring_setup(0x1a7f, &(0x7f0000000080)={0x0, 0x0, 0x10100, 0x0, 0x0, 0x0, r1}, &(0x7f0000000100), &(0x7f0000000140)=0x0) (async, rerun: 64) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) (rerun: 64) syz_io_uring_submit(r5, r4, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}) (async) syz_io_uring_setup(0x1a7f, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) (async, rerun: 32) syz_io_uring_setup(0x5e2, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) (rerun: 32) syz_io_uring_submit(r7, r6, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x7, 0x0, 0x0}) (async) syz_io_uring_complete(r7) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0xffffd000) (async, rerun: 32) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 20:50:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x2}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2790.290402][T10326] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2790.343129][T10327] __nla_validate_parse: 2 callbacks suppressed [ 2790.343148][T10327] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8030000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x3}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x10, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x4}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x5}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2790.562586][T10362] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2790.660699][T10362] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2790.694467][T10362] CPU: 0 PID: 10362 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2790.704601][T10362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2790.714683][T10362] Call Trace: [ 2790.717983][T10362] [ 2790.720946][T10362] dump_stack_lvl+0x125/0x1b0 [ 2790.725665][T10362] sysfs_warn_dup+0x7f/0xa0 [ 2790.730214][T10362] sysfs_create_dir_ns+0x247/0x2a0 [ 2790.735355][T10362] ? sysfs_create_mount_point+0xb0/0xb0 [ 2790.740929][T10362] ? spin_bug+0x1d0/0x1d0 [ 2790.745317][T10362] ? net_namespace+0x12/0x40 [ 2790.749941][T10362] ? device_namespace+0x8d/0xc0 [ 2790.754825][T10362] kobject_add_internal+0x2c8/0x960 [ 2790.760070][T10362] kobject_add+0x16f/0x240 [ 2790.764525][T10362] ? kset_create_and_add+0x190/0x190 [ 2790.769852][T10362] ? do_raw_spin_unlock+0x173/0x230 [ 2790.775098][T10362] ? kobject_put+0xbe/0x440 [ 2790.779651][T10362] device_add+0x289/0x1aa0 [ 2790.784100][T10362] ? device_initialize+0x510/0x510 [ 2790.789247][T10362] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2790.796144][T10362] ? __init_waitqueue_head+0xca/0x150 [ 2790.801559][T10362] netdev_register_kobject+0x183/0x3f0 [ 2790.807061][T10362] register_netdevice+0xbdf/0x14a0 [ 2790.812211][T10362] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2790.818155][T10362] veth_newlink+0x4ef/0xa00 [ 2790.822695][T10362] ? veth_set_features+0x2d0/0x2d0 [ 2790.827841][T10362] ? rtnl_create_link+0xc9c/0xfd0 [ 2790.832903][T10362] ? __rtnl_newlink+0x108a/0x1930 [ 2790.837967][T10362] ? rtnl_newlink+0x67/0xa0 [ 2790.842564][T10362] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2790.847801][T10362] ? alloc_netdev_mqs+0xee6/0x1290 [ 2790.852947][T10362] ? rtnl_create_link+0xa6d/0xfd0 [ 2790.858013][T10362] ? veth_set_features+0x2d0/0x2d0 [ 2790.863153][T10362] __rtnl_newlink+0x1173/0x1930 [ 2790.868069][T10362] ? rtnl_link_unregister+0x260/0x260 [ 2790.873516][T10362] rtnl_newlink+0x67/0xa0 [ 2790.877886][T10362] ? __rtnl_newlink+0x1930/0x1930 [ 2790.882948][T10362] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2790.887929][T10362] ? rtnl_getlink+0xb40/0xb40 [ 2790.892673][T10362] netlink_rcv_skb+0x16b/0x440 [ 2790.897565][T10362] ? rtnl_getlink+0xb40/0xb40 [ 2790.902287][T10362] ? netlink_ack+0x1370/0x1370 [ 2790.907103][T10362] ? netlink_deliver_tap+0x1a0/0xd00 [ 2790.912426][T10362] netlink_unicast+0x53b/0x810 [ 2790.917228][T10362] ? netlink_attachskb+0x880/0x880 [ 2790.922375][T10362] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2790.928311][T10362] ? __phys_addr_symbol+0x30/0x70 [ 2790.933371][T10362] ? __check_object_size+0x323/0x730 [ 2790.938708][T10362] netlink_sendmsg+0x93c/0xe40 [ 2790.943512][T10362] ? netlink_unicast+0x810/0x810 [ 2790.948491][T10362] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2790.953810][T10362] ? netlink_unicast+0x810/0x810 [ 2790.958781][T10362] __sock_sendmsg+0xd5/0x180 [ 2790.963412][T10362] ____sys_sendmsg+0x6ac/0x940 [ 2790.968217][T10362] ? copy_msghdr_from_user+0x10b/0x160 [ 2790.973708][T10362] ? kernel_sendmsg+0x50/0x50 [ 2790.978439][T10362] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2790.984467][T10362] ___sys_sendmsg+0x135/0x1d0 [ 2790.989177][T10362] ? do_recvmmsg+0x740/0x740 [ 2790.993796][T10362] ? find_held_lock+0x2d/0x110 [ 2790.998628][T10362] ? __fget_light+0xe6/0x260 [ 2791.003260][T10362] __sys_sendmsg+0x117/0x1e0 [ 2791.007883][T10362] ? __sys_sendmsg_sock+0x30/0x30 [ 2791.012932][T10362] ? xfd_validate_state+0x5d/0x180 [ 2791.018113][T10362] ? syscall_enter_from_user_mode+0x26/0x80 [ 2791.024058][T10362] do_syscall_64+0x3f/0x110 [ 2791.028597][T10362] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2791.034538][T10362] RIP: 0033:0x7f6554c7cae9 [ 2791.038978][T10362] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 20:50:11 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r5, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) openat$cgroup_ro(r5, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000100)={0x7, 'veth0_to_hsr\x00', {0x7}, 0xeff7}) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) [ 2791.058618][T10362] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2791.067065][T10362] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2791.075070][T10362] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2791.083076][T10362] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2791.091080][T10362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2791.099078][T10362] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2791.107091][T10362] 20:50:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x6}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:11 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000), 0xa300, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000780)={0x3, 0x0, &(0x7f0000000040)=[r3, r0]}, 0x2) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000740)={r1, 0x4, 0xfffff000, 0x2000}) ftruncate(r0, 0x7) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/96, 0x60}, {&(0x7f0000000080)=""/18, 0x12}, {&(0x7f0000000640)=""/140, 0x8c}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, &(0x7f0000000600)=[{&(0x7f0000000540)=""/163, 0xa3}, {&(0x7f0000000240)=""/64, 0x40}], 0x2, 0x0) r5 = syz_open_dev$vivid(&(0x7f0000000140), 0x0, 0x2) ioctl$AUTOFS_IOC_READY(r3, 0x9360, 0x2) ioctl$VIDIOC_S_INPUT(r5, 0xc0045627, &(0x7f0000000180)=0x2) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r6) [ 2791.163607][T10362] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x7}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:11 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async, rerun: 64) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000), 0xa300, 0x0) (async, rerun: 64) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) r3 = socket$caif_stream(0x25, 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000780)={0x3, 0x0, &(0x7f0000000040)=[r3, r0]}, 0x2) (async) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000740)={r1, 0x4, 0xfffff000, 0x2000}) (async) ftruncate(r0, 0x7) (async, rerun: 32) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) process_vm_writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/96, 0x60}, {&(0x7f0000000080)=""/18, 0x12}, {&(0x7f0000000640)=""/140, 0x8c}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, &(0x7f0000000600)=[{&(0x7f0000000540)=""/163, 0xa3}, {&(0x7f0000000240)=""/64, 0x40}], 0x2, 0x0) (async) r5 = syz_open_dev$vivid(&(0x7f0000000140), 0x0, 0x2) (async) ioctl$AUTOFS_IOC_READY(r3, 0x9360, 0x2) ioctl$VIDIOC_S_INPUT(r5, 0xc0045627, &(0x7f0000000180)=0x2) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r6) [ 2791.284587][T10364] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x11, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4030000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2791.459172][T10393] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x48}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2791.515457][T10393] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2791.552723][T10393] CPU: 0 PID: 10393 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2791.562857][T10393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2791.572942][T10393] Call Trace: [ 2791.576243][T10393] [ 2791.579189][T10393] dump_stack_lvl+0x125/0x1b0 [ 2791.583906][T10393] sysfs_warn_dup+0x7f/0xa0 [ 2791.588449][T10393] sysfs_create_dir_ns+0x247/0x2a0 [ 2791.593596][T10393] ? sysfs_create_mount_point+0xb0/0xb0 [ 2791.599176][T10393] ? spin_bug+0x1d0/0x1d0 [ 2791.603555][T10393] ? net_namespace+0x12/0x40 [ 2791.608182][T10393] ? device_namespace+0x8d/0xc0 [ 2791.613073][T10393] kobject_add_internal+0x2c8/0x960 [ 2791.618319][T10393] kobject_add+0x16f/0x240 [ 2791.622775][T10393] ? kset_create_and_add+0x190/0x190 [ 2791.628106][T10393] ? do_raw_spin_unlock+0x173/0x230 [ 2791.633351][T10393] ? kobject_put+0xbe/0x440 [ 2791.637895][T10393] device_add+0x289/0x1aa0 [ 2791.642341][T10393] ? device_initialize+0x510/0x510 [ 2791.647491][T10393] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2791.654371][T10393] ? __init_waitqueue_head+0xca/0x150 [ 2791.659785][T10393] netdev_register_kobject+0x183/0x3f0 20:50:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x4c}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:12 executing program 0: memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000), 0xa300, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/bus/input/handlers\x00', 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000780)={0x3, 0x0, &(0x7f0000000040)=[r3, r0]}, 0x2) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000740)={r1, 0x4, 0xfffff000, 0x2000}) (async) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000740)={r1, 0x4, 0xfffff000, 0x2000}) ftruncate(r0, 0x7) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/96, 0x60}, {&(0x7f0000000080)=""/18, 0x12}, {&(0x7f0000000640)=""/140, 0x8c}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, &(0x7f0000000600)=[{&(0x7f0000000540)=""/163, 0xa3}, {&(0x7f0000000240)=""/64, 0x40}], 0x2, 0x0) (async) process_vm_writev(r4, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/96, 0x60}, {&(0x7f0000000080)=""/18, 0x12}, {&(0x7f0000000640)=""/140, 0x8c}, {&(0x7f0000000180)=""/6, 0x6}], 0x4, &(0x7f0000000600)=[{&(0x7f0000000540)=""/163, 0xa3}, {&(0x7f0000000240)=""/64, 0x40}], 0x2, 0x0) syz_open_dev$vivid(&(0x7f0000000140), 0x0, 0x2) (async) r5 = syz_open_dev$vivid(&(0x7f0000000140), 0x0, 0x2) ioctl$AUTOFS_IOC_READY(r3, 0x9360, 0x2) ioctl$VIDIOC_S_INPUT(r5, 0xc0045627, &(0x7f0000000180)=0x2) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r6) [ 2791.665284][T10393] register_netdevice+0xbdf/0x14a0 [ 2791.670428][T10393] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2791.676357][T10393] veth_newlink+0x4ef/0xa00 [ 2791.680886][T10393] ? veth_set_features+0x2d0/0x2d0 [ 2791.686022][T10393] ? rtnl_create_link+0xc9c/0xfd0 [ 2791.691081][T10393] ? __rtnl_newlink+0x108a/0x1930 [ 2791.696141][T10393] ? rtnl_newlink+0x67/0xa0 [ 2791.700746][T10393] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2791.705981][T10393] ? alloc_netdev_mqs+0xee6/0x1290 [ 2791.711135][T10393] ? rtnl_create_link+0xa6d/0xfd0 [ 2791.716209][T10393] ? veth_set_features+0x2d0/0x2d0 [ 2791.721352][T10393] __rtnl_newlink+0x1173/0x1930 [ 2791.726260][T10393] ? rtnl_link_unregister+0x260/0x260 [ 2791.731706][T10393] rtnl_newlink+0x67/0xa0 [ 2791.736071][T10393] ? __rtnl_newlink+0x1930/0x1930 [ 2791.741142][T10393] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2791.746129][T10393] ? rtnl_getlink+0xb40/0xb40 [ 2791.750870][T10393] netlink_rcv_skb+0x16b/0x440 [ 2791.755662][T10393] ? rtnl_getlink+0xb40/0xb40 [ 2791.760383][T10393] ? netlink_ack+0x1370/0x1370 [ 2791.765200][T10393] ? netlink_deliver_tap+0x1a0/0xd00 [ 2791.770523][T10393] netlink_unicast+0x53b/0x810 [ 2791.775325][T10393] ? netlink_attachskb+0x880/0x880 [ 2791.780467][T10393] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2791.786398][T10393] ? __phys_addr_symbol+0x30/0x70 [ 2791.791462][T10393] ? __check_object_size+0x323/0x730 [ 2791.796799][T10393] netlink_sendmsg+0x93c/0xe40 [ 2791.801604][T10393] ? netlink_unicast+0x810/0x810 [ 2791.806583][T10393] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2791.811902][T10393] ? netlink_unicast+0x810/0x810 [ 2791.816880][T10393] __sock_sendmsg+0xd5/0x180 [ 2791.821513][T10393] ____sys_sendmsg+0x6ac/0x940 [ 2791.826408][T10393] ? copy_msghdr_from_user+0x10b/0x160 [ 2791.831988][T10393] ? kernel_sendmsg+0x50/0x50 [ 2791.836717][T10393] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2791.842746][T10393] ___sys_sendmsg+0x135/0x1d0 [ 2791.847459][T10393] ? do_recvmmsg+0x740/0x740 [ 2791.852085][T10393] ? find_held_lock+0x2d/0x110 [ 2791.856928][T10393] ? __fget_light+0xe6/0x260 [ 2791.861565][T10393] __sys_sendmsg+0x117/0x1e0 [ 2791.866188][T10393] ? __sys_sendmsg_sock+0x30/0x30 [ 2791.871242][T10393] ? xfd_validate_state+0x5d/0x180 [ 2791.876417][T10393] ? syscall_enter_from_user_mode+0x26/0x80 [ 2791.882360][T10393] do_syscall_64+0x3f/0x110 [ 2791.886900][T10393] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2791.892838][T10393] RIP: 0033:0x7f6554c7cae9 [ 2791.897278][T10393] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2791.917009][T10393] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2791.925462][T10393] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2791.933463][T10393] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2791.941460][T10393] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2791.949470][T10393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2791.957470][T10393] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2791.965491][T10393] 20:50:12 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) (async) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$rxrpc(0x21, 0x2, 0xa) (async) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r5, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) openat$cgroup_ro(r5, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000100)={0x7, 'veth0_to_hsr\x00', {0x7}, 0xeff7}) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:50:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x68}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2792.005666][T10393] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2792.066353][T10399] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x6c}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x14, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:12 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000080)=""/138, 0x8a}], 0x1, 0x0) 20:50:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd030000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2792.223213][T10423] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x74}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2792.308178][T10423] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2792.329919][T10423] CPU: 0 PID: 10423 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2792.340047][T10423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2792.350130][T10423] Call Trace: [ 2792.353426][T10423] 20:50:12 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000080)=""/138, 0x8a}], 0x1, 0x0) memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000080)=""/138, 0x8a}], 0x1, 0x0) (async) [ 2792.356379][T10423] dump_stack_lvl+0x125/0x1b0 [ 2792.361095][T10423] sysfs_warn_dup+0x7f/0xa0 [ 2792.365644][T10423] sysfs_create_dir_ns+0x247/0x2a0 [ 2792.370784][T10423] ? sysfs_create_mount_point+0xb0/0xb0 [ 2792.376367][T10423] ? spin_bug+0x1d0/0x1d0 [ 2792.380740][T10423] ? net_namespace+0x12/0x40 [ 2792.385368][T10423] ? device_namespace+0x8d/0xc0 [ 2792.390259][T10423] kobject_add_internal+0x2c8/0x960 [ 2792.395501][T10423] kobject_add+0x16f/0x240 [ 2792.399951][T10423] ? kset_create_and_add+0x190/0x190 [ 2792.405353][T10423] ? do_raw_spin_unlock+0x173/0x230 [ 2792.410573][T10423] ? kobject_put+0xbe/0x440 [ 2792.415100][T10423] device_add+0x289/0x1aa0 [ 2792.419524][T10423] ? device_initialize+0x510/0x510 [ 2792.424654][T10423] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2792.431512][T10423] ? __init_waitqueue_head+0xca/0x150 [ 2792.436904][T10423] netdev_register_kobject+0x183/0x3f0 [ 2792.442375][T10423] register_netdevice+0xbdf/0x14a0 [ 2792.447500][T10423] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2792.453405][T10423] veth_newlink+0x4ef/0xa00 [ 2792.457919][T10423] ? veth_set_features+0x2d0/0x2d0 [ 2792.463036][T10423] ? rtnl_create_link+0xc9c/0xfd0 [ 2792.468070][T10423] ? __rtnl_newlink+0x108a/0x1930 [ 2792.473107][T10423] ? rtnl_newlink+0x67/0xa0 [ 2792.477673][T10423] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2792.482882][T10423] ? alloc_netdev_mqs+0xee6/0x1290 [ 2792.488007][T10423] ? rtnl_create_link+0xa6d/0xfd0 [ 2792.493046][T10423] ? veth_set_features+0x2d0/0x2d0 [ 2792.498162][T10423] __rtnl_newlink+0x1173/0x1930 [ 2792.503046][T10423] ? rtnl_link_unregister+0x260/0x260 [ 2792.508467][T10423] rtnl_newlink+0x67/0xa0 [ 2792.512811][T10423] ? __rtnl_newlink+0x1930/0x1930 [ 2792.517850][T10423] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2792.522805][T10423] ? rtnl_getlink+0xb40/0xb40 [ 2792.527595][T10423] netlink_rcv_skb+0x16b/0x440 [ 2792.532579][T10423] ? rtnl_getlink+0xb40/0xb40 [ 2792.537363][T10423] ? netlink_ack+0x1370/0x1370 [ 2792.542146][T10423] ? netlink_deliver_tap+0x1a0/0xd00 [ 2792.547444][T10423] netlink_unicast+0x53b/0x810 [ 2792.552220][T10423] ? netlink_attachskb+0x880/0x880 [ 2792.557336][T10423] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2792.563235][T10423] ? __phys_addr_symbol+0x30/0x70 [ 2792.568267][T10423] ? __check_object_size+0x323/0x730 [ 2792.573571][T10423] netlink_sendmsg+0x93c/0xe40 [ 2792.578348][T10423] ? netlink_unicast+0x810/0x810 [ 2792.583297][T10423] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2792.588587][T10423] ? netlink_unicast+0x810/0x810 [ 2792.593531][T10423] __sock_sendmsg+0xd5/0x180 [ 2792.598137][T10423] ____sys_sendmsg+0x6ac/0x940 [ 2792.602915][T10423] ? copy_msghdr_from_user+0x10b/0x160 [ 2792.608380][T10423] ? kernel_sendmsg+0x50/0x50 [ 2792.613079][T10423] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2792.619084][T10423] ___sys_sendmsg+0x135/0x1d0 [ 2792.623771][T10423] ? do_recvmmsg+0x740/0x740 [ 2792.628366][T10423] ? find_held_lock+0x2d/0x110 [ 2792.633164][T10423] ? __fget_light+0xe6/0x260 [ 2792.637778][T10423] __sys_sendmsg+0x117/0x1e0 [ 2792.642377][T10423] ? __sys_sendmsg_sock+0x30/0x30 [ 2792.647407][T10423] ? xfd_validate_state+0x5d/0x180 [ 2792.652550][T10423] ? syscall_enter_from_user_mode+0x26/0x80 [ 2792.658466][T10423] do_syscall_64+0x3f/0x110 [ 2792.663064][T10423] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2792.668972][T10423] RIP: 0033:0x7f6554c7cae9 [ 2792.673393][T10423] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2792.693007][T10423] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2792.701427][T10423] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2792.709402][T10423] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2792.717386][T10423] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2792.725360][T10423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2792.733330][T10423] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2792.741320][T10423] 20:50:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x7a}}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:13 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000080)=""/138, 0x8a}], 0x1, 0x0) [ 2792.794505][T10423] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:13 executing program 2: pipe(&(0x7f0000000140)) (async) socket$netlink(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 64) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 64) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) (async, rerun: 64) r1 = socket$rxrpc(0x21, 0x2, 0xa) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async, rerun: 32) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r5, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) openat$cgroup_ro(r5, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) (async) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000100)={0x7, 'veth0_to_hsr\x00', {0x7}, 0xeff7}) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) (async) sendfile(r3, r2, 0x0, 0x100000002) [ 2792.869804][T10429] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x15, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:13 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) r8 = openat$sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) r9 = fspick(r1, &(0x7f0000000100)='./file0\x00', 0x1) dup3(r8, r9, 0x80000) 20:50:13 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) process_vm_readv(r1, &(0x7f0000000040)=[{&(0x7f0000000000)=""/58, 0x3a}], 0x1, &(0x7f0000000980)=[{&(0x7f0000000080)=""/60, 0x3c}, {&(0x7f00000000c0)=""/237, 0xed}, {&(0x7f00000001c0)=""/9, 0x9}, {&(0x7f0000000540)=""/206, 0xce}, {&(0x7f0000000640)=""/227, 0xe3}, {&(0x7f0000000740)=""/138, 0x8a}, {&(0x7f0000000800)=""/145, 0x91}, {&(0x7f00000008c0)=""/136, 0x88}], 0x8, 0x0) 20:50:13 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2793.097391][T10462] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x48, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2793.259741][T10471] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2793.331484][T10471] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2793.351576][T10471] CPU: 1 PID: 10471 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2793.361704][T10471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2793.371788][T10471] Call Trace: [ 2793.375092][T10471] [ 2793.378056][T10471] dump_stack_lvl+0x125/0x1b0 [ 2793.382944][T10471] sysfs_warn_dup+0x7f/0xa0 [ 2793.387502][T10471] sysfs_create_dir_ns+0x247/0x2a0 [ 2793.392642][T10471] ? sysfs_create_mount_point+0xb0/0xb0 [ 2793.398217][T10471] ? spin_bug+0x1d0/0x1d0 [ 2793.402589][T10471] ? net_namespace+0x12/0x40 [ 2793.407211][T10471] ? device_namespace+0x8d/0xc0 [ 2793.412102][T10471] kobject_add_internal+0x2c8/0x960 [ 2793.417354][T10471] kobject_add+0x16f/0x240 [ 2793.421805][T10471] ? kset_create_and_add+0x190/0x190 [ 2793.427124][T10471] ? do_raw_spin_unlock+0x173/0x230 [ 2793.432363][T10471] ? kobject_put+0xbe/0x440 [ 2793.436911][T10471] device_add+0x289/0x1aa0 [ 2793.441357][T10471] ? device_initialize+0x510/0x510 [ 2793.446507][T10471] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2793.453388][T10471] ? __init_waitqueue_head+0xca/0x150 [ 2793.458803][T10471] netdev_register_kobject+0x183/0x3f0 [ 2793.464469][T10471] register_netdevice+0xbdf/0x14a0 [ 2793.469699][T10471] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2793.475636][T10471] veth_newlink+0x4ef/0xa00 [ 2793.480174][T10471] ? veth_set_features+0x2d0/0x2d0 [ 2793.485311][T10471] ? rtnl_create_link+0xc9c/0xfd0 [ 2793.490366][T10471] ? __rtnl_newlink+0x108a/0x1930 [ 2793.495431][T10471] ? rtnl_newlink+0x67/0xa0 [ 2793.500031][T10471] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2793.505254][T10471] ? alloc_netdev_mqs+0xee6/0x1290 [ 2793.510394][T10471] ? rtnl_create_link+0xa6d/0xfd0 [ 2793.515433][T10471] ? veth_set_features+0x2d0/0x2d0 [ 2793.520549][T10471] __rtnl_newlink+0x1173/0x1930 [ 2793.525424][T10471] ? rtnl_link_unregister+0x260/0x260 [ 2793.530836][T10471] rtnl_newlink+0x67/0xa0 [ 2793.535176][T10471] ? __rtnl_newlink+0x1930/0x1930 [ 2793.540212][T10471] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2793.545166][T10471] ? rtnl_getlink+0xb40/0xb40 [ 2793.549871][T10471] netlink_rcv_skb+0x16b/0x440 [ 2793.554641][T10471] ? rtnl_getlink+0xb40/0xb40 [ 2793.559330][T10471] ? netlink_ack+0x1370/0x1370 [ 2793.564116][T10471] ? netlink_deliver_tap+0x1a0/0xd00 [ 2793.569411][T10471] netlink_unicast+0x53b/0x810 [ 2793.574184][T10471] ? netlink_attachskb+0x880/0x880 [ 2793.579406][T10471] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2793.585306][T10471] ? __phys_addr_symbol+0x30/0x70 [ 2793.590339][T10471] ? __check_object_size+0x323/0x730 [ 2793.595643][T10471] netlink_sendmsg+0x93c/0xe40 [ 2793.600507][T10471] ? netlink_unicast+0x810/0x810 [ 2793.605453][T10471] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2793.610764][T10471] ? netlink_unicast+0x810/0x810 [ 2793.615724][T10471] __sock_sendmsg+0xd5/0x180 [ 2793.620343][T10471] ____sys_sendmsg+0x6ac/0x940 [ 2793.625135][T10471] ? copy_msghdr_from_user+0x10b/0x160 [ 2793.630618][T10471] ? kernel_sendmsg+0x50/0x50 [ 2793.635316][T10471] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2793.641319][T10471] ___sys_sendmsg+0x135/0x1d0 [ 2793.646008][T10471] ? do_recvmmsg+0x740/0x740 [ 2793.650606][T10471] ? find_held_lock+0x2d/0x110 [ 2793.655413][T10471] ? __fget_light+0xe6/0x260 [ 2793.660057][T10471] __sys_sendmsg+0x117/0x1e0 [ 2793.664665][T10471] ? __sys_sendmsg_sock+0x30/0x30 [ 2793.669729][T10471] ? xfd_validate_state+0x5d/0x180 [ 2793.674898][T10471] ? syscall_enter_from_user_mode+0x26/0x80 [ 2793.680840][T10471] do_syscall_64+0x3f/0x110 [ 2793.685368][T10471] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2793.691388][T10471] RIP: 0033:0x7f6554c7cae9 [ 2793.695818][T10471] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2793.715447][T10471] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2793.723867][T10471] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 20:50:14 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async, rerun: 32) process_vm_readv(r1, &(0x7f0000000040)=[{&(0x7f0000000000)=""/58, 0x3a}], 0x1, &(0x7f0000000980)=[{&(0x7f0000000080)=""/60, 0x3c}, {&(0x7f00000000c0)=""/237, 0xed}, {&(0x7f00000001c0)=""/9, 0x9}, {&(0x7f0000000540)=""/206, 0xce}, {&(0x7f0000000640)=""/227, 0xe3}, {&(0x7f0000000740)=""/138, 0x8a}, {&(0x7f0000000800)=""/145, 0x91}, {&(0x7f00000008c0)=""/136, 0x88}], 0x8, 0x0) (rerun: 32) [ 2793.731846][T10471] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2793.739824][T10471] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2793.747824][T10471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2793.755799][T10471] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2793.763814][T10471] 20:50:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x5}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2793.814642][T10471] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:14 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) process_vm_readv(r1, &(0x7f0000000040)=[{&(0x7f0000000000)=""/58, 0x3a}], 0x1, &(0x7f0000000980)=[{&(0x7f0000000080)=""/60, 0x3c}, {&(0x7f00000000c0)=""/237, 0xed}, {&(0x7f00000001c0)=""/9, 0x9}, {&(0x7f0000000540)=""/206, 0xce}, {&(0x7f0000000640)=""/227, 0xe3}, {&(0x7f0000000740)=""/138, 0x8a}, {&(0x7f0000000800)=""/145, 0x91}, {&(0x7f00000008c0)=""/136, 0x88}], 0x8, 0x0) 20:50:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x6}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:14 executing program 2: pipe(&(0x7f0000000140)) (async) socket$netlink(0x10, 0x3, 0x0) (async, rerun: 32) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async, rerun: 32) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 32) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 32) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) (async) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) r8 = openat$sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) (async) r9 = fspick(r1, &(0x7f0000000100)='./file0\x00', 0x1) dup3(r8, r9, 0x80000) [ 2793.966329][T10480] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x7}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x4c, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:14 executing program 0: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r0, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000100)=""/28, 0x1c}], 0x2, 0x5, 0x2) 20:50:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x8}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:14 executing program 2: pipe(&(0x7f0000000140)) (async) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) (async) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) (async) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) (async) r8 = openat$sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) (async) r9 = fspick(r1, &(0x7f0000000100)='./file0\x00', 0x1) dup3(r8, r9, 0x80000) 20:50:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x48}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:14 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000480)=ANY=[], 0x208e24b) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r4, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=@getchain={0x44, 0x66, 0x4, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xfff3, 0xd}, {0xe, 0x7}, {0xffff, 0xfff1}}, [{0x8, 0xb, 0x5}, {0x8, 0xb, 0x5}, {0x8, 0xb, 0x16}, {0x8, 0xb, 0xb4f3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r5 = socket$rxrpc(0x21, 0x2, 0xa) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000080)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="42ee98a4", @ANYRESDEC=r1, @ANYBLOB="2d0120000000050000000800030000000000", @ANYRES16=r3], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) shutdown(r0, 0x1) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r8, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r7, r6, 0x0, 0x100000002) 20:50:14 executing program 0: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, 0xffffffffffffffff, 0x0) (async) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r0, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000100)=""/28, 0x1c}], 0x2, 0x5, 0x2) [ 2794.360743][T10514] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2794.389353][T10514] CPU: 0 PID: 10514 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2794.399497][T10514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2794.409648][T10514] Call Trace: [ 2794.412958][T10514] [ 2794.415912][T10514] dump_stack_lvl+0x125/0x1b0 [ 2794.420632][T10514] sysfs_warn_dup+0x7f/0xa0 [ 2794.425183][T10514] sysfs_create_dir_ns+0x247/0x2a0 [ 2794.430332][T10514] ? sysfs_create_mount_point+0xb0/0xb0 [ 2794.435921][T10514] ? spin_bug+0x1d0/0x1d0 [ 2794.440303][T10514] ? net_namespace+0x12/0x40 [ 2794.444944][T10514] ? device_namespace+0x8d/0xc0 [ 2794.449853][T10514] kobject_add_internal+0x2c8/0x960 [ 2794.455103][T10514] kobject_add+0x16f/0x240 [ 2794.459573][T10514] ? kset_create_and_add+0x190/0x190 [ 2794.464902][T10514] ? do_raw_spin_unlock+0x173/0x230 [ 2794.470144][T10514] ? kobject_put+0xbe/0x440 [ 2794.474696][T10514] device_add+0x289/0x1aa0 [ 2794.479232][T10514] ? device_initialize+0x510/0x510 [ 2794.484399][T10514] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2794.491289][T10514] ? __init_waitqueue_head+0xca/0x150 [ 2794.496708][T10514] netdev_register_kobject+0x183/0x3f0 [ 2794.502207][T10514] register_netdevice+0xbdf/0x14a0 20:50:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:15 executing program 0: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, 0xffffffffffffffff, 0x0) (async) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r0, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000100)=""/28, 0x1c}], 0x2, 0x5, 0x2) [ 2794.507444][T10514] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2794.513390][T10514] veth_newlink+0x4ef/0xa00 [ 2794.517937][T10514] ? veth_set_features+0x2d0/0x2d0 [ 2794.523081][T10514] ? rtnl_create_link+0xc9c/0xfd0 [ 2794.528143][T10514] ? __rtnl_newlink+0x108a/0x1930 [ 2794.533210][T10514] ? rtnl_newlink+0x67/0xa0 [ 2794.537902][T10514] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2794.543145][T10514] ? alloc_netdev_mqs+0xee6/0x1290 [ 2794.548305][T10514] ? rtnl_create_link+0xa6d/0xfd0 [ 2794.553386][T10514] ? veth_set_features+0x2d0/0x2d0 [ 2794.558532][T10514] __rtnl_newlink+0x1173/0x1930 [ 2794.563446][T10514] ? rtnl_link_unregister+0x260/0x260 [ 2794.568899][T10514] rtnl_newlink+0x67/0xa0 [ 2794.573269][T10514] ? __rtnl_newlink+0x1930/0x1930 [ 2794.578332][T10514] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2794.583322][T10514] ? rtnl_getlink+0xb40/0xb40 [ 2794.588047][T10514] ? find_held_lock+0x2d/0x110 [ 2794.592854][T10514] ? rcu_preempt_deferred_qs_irqrestore+0x684/0xdb0 [ 2794.599485][T10514] ? reacquire_held_locks+0x4b0/0x4b0 [ 2794.604909][T10514] netlink_rcv_skb+0x16b/0x440 [ 2794.609712][T10514] ? rtnl_getlink+0xb40/0xb40 [ 2794.614430][T10514] ? netlink_ack+0x1370/0x1370 [ 2794.619255][T10514] ? _raw_spin_unlock_irqrestore+0x3b/0x70 [ 2794.625119][T10514] ? __rcu_read_unlock+0x2ad/0x570 [ 2794.630280][T10514] ? netlink_deliver_tap+0x1a0/0xd00 [ 2794.635691][T10514] netlink_unicast+0x53b/0x810 [ 2794.640492][T10514] ? netlink_attachskb+0x880/0x880 [ 2794.645630][T10514] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2794.651557][T10514] ? __phys_addr_symbol+0x30/0x70 [ 2794.656629][T10514] ? __check_object_size+0x323/0x730 [ 2794.661966][T10514] netlink_sendmsg+0x93c/0xe40 [ 2794.666785][T10514] ? netlink_unicast+0x810/0x810 [ 2794.671765][T10514] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2794.677083][T10514] ? netlink_unicast+0x810/0x810 [ 2794.682063][T10514] __sock_sendmsg+0xd5/0x180 [ 2794.686697][T10514] ____sys_sendmsg+0x6ac/0x940 [ 2794.691508][T10514] ? copy_msghdr_from_user+0x10b/0x160 [ 2794.697001][T10514] ? kernel_sendmsg+0x50/0x50 [ 2794.701734][T10514] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2794.707766][T10514] ___sys_sendmsg+0x135/0x1d0 [ 2794.712480][T10514] ? do_recvmmsg+0x740/0x740 [ 2794.717103][T10514] ? find_held_lock+0x2d/0x110 [ 2794.721938][T10514] ? __fget_light+0xe6/0x260 [ 2794.726572][T10514] __sys_sendmsg+0x117/0x1e0 [ 2794.731192][T10514] ? __sys_sendmsg_sock+0x30/0x30 [ 2794.736238][T10514] ? xfd_validate_state+0x5d/0x180 [ 2794.741408][T10514] ? syscall_enter_from_user_mode+0x26/0x80 [ 2794.747356][T10514] do_syscall_64+0x3f/0x110 [ 2794.751897][T10514] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2794.757846][T10514] RIP: 0033:0x7f6554c7cae9 [ 2794.762288][T10514] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2794.781936][T10514] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2794.790389][T10514] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2794.798396][T10514] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 20:50:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x4c}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2794.806404][T10514] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2794.814492][T10514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2794.822496][T10514] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2794.830513][T10514] 20:50:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x68}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2794.893442][T10514] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:15 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000180)={0xc, 0x8}, 0x10) 20:50:15 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r4, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=@getchain={0x44, 0x66, 0x4, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xfff3, 0xd}, {0xe, 0x7}, {0xffff, 0xfff1}}, [{0x8, 0xb, 0x5}, {0x8, 0xb, 0x5}, {0x8, 0xb, 0x16}, {0x8, 0xb, 0xb4f3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x10) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r5 = socket$rxrpc(0x21, 0x2, 0xa) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) (async) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000080)) (async) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="42ee98a4", @ANYRESDEC=r1, @ANYBLOB="2d0120000000050000000800030000000000", @ANYRES16=r3], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) shutdown(r0, 0x1) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r8, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r5], 0x4}}, 0x0) (async) sendfile(r7, r6, 0x0, 0x100000002) 20:50:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x6c}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x60, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:15 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x74}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2795.268559][T10561] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2795.279137][T10561] CPU: 1 PID: 10561 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2795.289256][T10561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2795.299342][T10561] Call Trace: [ 2795.302645][T10561] [ 2795.305597][T10561] dump_stack_lvl+0x125/0x1b0 [ 2795.310313][T10561] sysfs_warn_dup+0x7f/0xa0 [ 2795.314864][T10561] sysfs_create_dir_ns+0x247/0x2a0 [ 2795.320001][T10561] ? sysfs_create_mount_point+0xb0/0xb0 [ 2795.325571][T10561] ? spin_bug+0x1d0/0x1d0 [ 2795.329939][T10561] ? net_namespace+0x12/0x40 [ 2795.334567][T10561] ? device_namespace+0x8d/0xc0 [ 2795.339456][T10561] kobject_add_internal+0x2c8/0x960 [ 2795.344697][T10561] kobject_add+0x16f/0x240 [ 2795.349144][T10561] ? kset_create_and_add+0x190/0x190 [ 2795.354464][T10561] ? do_raw_spin_unlock+0x173/0x230 [ 2795.359706][T10561] ? kobject_put+0xbe/0x440 [ 2795.364262][T10561] device_add+0x289/0x1aa0 20:50:15 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000180)={0xc, 0x8}, 0x10) [ 2795.368708][T10561] ? device_initialize+0x510/0x510 [ 2795.373859][T10561] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2795.380747][T10561] ? __init_waitqueue_head+0xca/0x150 [ 2795.386166][T10561] netdev_register_kobject+0x183/0x3f0 [ 2795.391666][T10561] register_netdevice+0xbdf/0x14a0 [ 2795.396897][T10561] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2795.402833][T10561] veth_newlink+0x4ef/0xa00 [ 2795.407377][T10561] ? veth_set_features+0x2d0/0x2d0 [ 2795.412511][T10561] ? rtnl_create_link+0xc9c/0xfd0 20:50:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x7a}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2795.417571][T10561] ? __rtnl_newlink+0x108a/0x1930 [ 2795.422633][T10561] ? rtnl_newlink+0x67/0xa0 [ 2795.427236][T10561] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2795.432471][T10561] ? alloc_netdev_mqs+0xee6/0x1290 [ 2795.437628][T10561] ? rtnl_create_link+0xa6d/0xfd0 [ 2795.442692][T10561] ? veth_set_features+0x2d0/0x2d0 [ 2795.447833][T10561] __rtnl_newlink+0x1173/0x1930 [ 2795.452795][T10561] ? rtnl_link_unregister+0x260/0x260 [ 2795.458247][T10561] rtnl_newlink+0x67/0xa0 [ 2795.462613][T10561] ? __rtnl_newlink+0x1930/0x1930 20:50:16 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000180)={0xc, 0x8}, 0x10) [ 2795.467684][T10561] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2795.472664][T10561] ? rtnl_getlink+0xb40/0xb40 [ 2795.477399][T10561] netlink_rcv_skb+0x16b/0x440 [ 2795.482196][T10561] ? rtnl_getlink+0xb40/0xb40 [ 2795.486915][T10561] ? netlink_ack+0x1370/0x1370 [ 2795.491726][T10561] ? netlink_deliver_tap+0x1a0/0xd00 [ 2795.497047][T10561] netlink_unicast+0x53b/0x810 [ 2795.501845][T10561] ? netlink_attachskb+0x880/0x880 [ 2795.506989][T10561] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2795.512919][T10561] ? __phys_addr_symbol+0x30/0x70 20:50:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x300}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2795.517981][T10561] ? __check_object_size+0x323/0x730 [ 2795.523312][T10561] netlink_sendmsg+0x93c/0xe40 [ 2795.528129][T10561] ? netlink_unicast+0x810/0x810 [ 2795.533109][T10561] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2795.538429][T10561] ? netlink_unicast+0x810/0x810 [ 2795.543395][T10561] __sock_sendmsg+0xd5/0x180 [ 2795.548023][T10561] ____sys_sendmsg+0x6ac/0x940 [ 2795.552838][T10561] ? copy_msghdr_from_user+0x10b/0x160 [ 2795.558330][T10561] ? kernel_sendmsg+0x50/0x50 [ 2795.563059][T10561] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2795.569088][T10561] ___sys_sendmsg+0x135/0x1d0 [ 2795.573804][T10561] ? do_recvmmsg+0x740/0x740 [ 2795.578426][T10561] ? find_held_lock+0x2d/0x110 [ 2795.583255][T10561] ? __fget_light+0xe6/0x260 [ 2795.587890][T10561] __sys_sendmsg+0x117/0x1e0 [ 2795.592510][T10561] ? __sys_sendmsg_sock+0x30/0x30 [ 2795.597555][T10561] ? xfd_validate_state+0x5d/0x180 [ 2795.602726][T10561] ? syscall_enter_from_user_mode+0x26/0x80 [ 2795.608665][T10561] do_syscall_64+0x3f/0x110 [ 2795.613206][T10561] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2795.619143][T10561] RIP: 0033:0x7f6554c7cae9 [ 2795.623582][T10561] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2795.643225][T10561] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2795.651677][T10561] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2795.659686][T10561] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 20:50:16 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000002100)=ANY=[@ANYBLOB="d8080008", @ANYRES16=0x0, @ANYBLOB="080027bd7000fbdbdf256600000008000300", @ANYRES32=0x0, @ANYBLOB="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"], 0x8d8}, 0x1, 0x0, 0x0, 0x4040014}, 0x80) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) r3 = getpid() process_vm_readv(r3, &(0x7f0000008400)=[{0x0}], 0x1, 0x0, 0x0, 0x0) pidfd_open(r3, 0x0) 20:50:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x500}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:16 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff}) (async) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000480)=ANY=[], 0x208e24b) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r4, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=@getchain={0x44, 0x66, 0x4, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xfff3, 0xd}, {0xe, 0x7}, {0xffff, 0xfff1}}, [{0x8, 0xb, 0x5}, {0x8, 0xb, 0x5}, {0x8, 0xb, 0x16}, {0x8, 0xb, 0xb4f3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) (async) r5 = socket$rxrpc(0x21, 0x2, 0xa) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) (async) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000080)) (async) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="42ee98a4", @ANYRESDEC=r1, @ANYBLOB="2d0120000000050000000800030000000000", @ANYRES16=r3], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) shutdown(r0, 0x1) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r8, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r7, r6, 0x0, 0x100000002) [ 2795.667695][T10561] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2795.675699][T10561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2795.683705][T10561] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2795.691730][T10561] [ 2795.737138][T10561] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x600}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2795.797805][T10584] __nla_validate_parse: 3 callbacks suppressed [ 2795.797825][T10584] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x68, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:16 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000002100)=ANY=[@ANYBLOB="d8080008", @ANYRES16=0x0, @ANYBLOB="080027bd7000fbdbdf256600000008000300", @ANYRES32=0x0, @ANYBLOB="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"], 0x8d8}, 0x1, 0x0, 0x0, 0x4040014}, 0x80) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) r3 = getpid() process_vm_readv(r3, &(0x7f0000008400)=[{0x0}], 0x1, 0x0, 0x0, 0x0) (async) pidfd_open(r3, 0x0) 20:50:16 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x700}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:16 executing program 2: pipe(&(0x7f0000000140)) r0 = socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0xa) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000080)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r8, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRESDEC=r2, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES16=r8, @ANYRES8=r0], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) 20:50:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x4800}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:16 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000002100)=ANY=[@ANYBLOB="d8080008", @ANYRES16=0x0, @ANYBLOB="080027bd7000fbdbdf256600000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990001000000360000004008b9800e00bb004000090009008000050000001600bb00006eff7f0300e11f0002c30ffbff09000100000019022a002d1a00200767090000000000004000090003000000000840000000097107000000ffff1f307107010001ff010800826d410709090000000802110000010500000008021100000004000000060000000701080211000000ff7f00000008021100000102000000010802110000010400000005080211000001ff000000050802110000010100008004ffffffffffff01000000050802110000000d5e00000006010101010101379100034da6baf181a9fae193151255cede1253a73d7e36b12a9faf1c0f37f94653d8710f1d42086e0266169529ea4b8dea74223f420ebcd3742d1a9c52e0219db4d8c7e792d7b6df5585fc5032e8671bf3e9210105c9b7c705f604152ed81a66d60f046fe9eb08730ef09f89d583a64d56021f9db24115a0d66137601652feab8c2a3f3c1b91357aad75098aa199047b125eddcd26c084baa45bd79f519058b50b720e04ff16f0d127f96b4762413211ae939d48826e92e720b3b4cf044fa19d112bd79072e87721ee12e3f3d1f869be0bbf2da1b686003b400f874c662da9baf43433781bf6a401834675dee8112ca495864a0e17e87d5fcea4fe5e5bdcc9a187d2703fbe224c2b30030f2133b08dd4e7c63f47ffb57188c2ef829bd2b19e4a689e80b414648c9ec7753c56ded95a2d096e27931e6d9ddc4f0f2ea5aa1da5531f701f6a5897f08da2f7b5b6888d194a37fc4e6553a6348437a5f79276e65aa3ad0301212503018c053c040101b907000000bc000e80b7000300f6ae3f5768722febb5ceee51df2194b34fae43360043262f23c155feedfb8efde64a8c43a9dec598b6b9c1bbc106c63becfa3c965e3cde79da0e2e15de5a64241aef4eefdf8d2cf94dcbd9403309e191c60a4ec2c0a64af8d1dc573561452295ba2ecc17b02c0204599fb57ac07301fdc9b771b881828a73fcdaab42b8e4ab0f297271fae5494b9fe39819706a5da0d7c9e099bdf033766e5de8bb42bcce4d10ee47d630a343b800ec84657371114c00d56ec30009028000ddf663c3778da6a85ea90b1045ef3a9d51b08f7f05abf5dbd3d85aa222313f453d296d305e5e7b489c5062c5060f7bfcb50b96770ded769c1ac5b31d10d14dd7928c0c1e3de83a4fdcc6daee2abaca62d4d388b766972a5fdb811f8b3fa372f72c78650855a743941ba81de9095f0840029c645e1eaba296a88a52c2f5f5dc4df68074b1f685dd3062b7f1d889133af8051be8dfbf4a268e301e85af583de845331fd163ee04b90a22e77d09806ff57de4b4b57cdae181e6b57ba4a16bcb8c0a335b791fb8c955ab537af4310799d9e46f6aac4a6a82f9474c76f45ad7cc4de8855344d94c260e9bd845a213f36f0551d4b6cb70bcebd58fddc47457d6b23034982c0571d3755505f279841884c550dc48eb86670f417b0f475578e46feeb1b53c2e477ae74bb9ac3287ac9058d264aac74a806e8d20f2b9f6b5e4772fe5554cfb241a04a22c25a8dffd550c20b32a38c09156e3dfcdc5c2217e9cdd96575dd9b8f46a33ae30455188b478a4bffeb18510dcf1c68db3a25ab3db311eacf8e390885b4a550c308f5eeb4fb403d0a1541e611b2928bebeea286d7dcad1813771b811961e16b399be1cd3539daa1d09dae66f7fa62504fd31510a3f5f7f5cf03c0401a7021f760600001800020071070000ffff021f2001073606248124010b2d1a00801e0200000000000000050080000d0000000004ef00000081040609090300fd0e2a010100000019012a0003019d0406f107030009008c10b3035d33769b7a089b62da97ee5fa6b504064b3f40000900831f002080080211000001090000007f00000040000000080211000000020000003c04004074018c10cf032e3e064dbe272c9d431aa03888abddb5d4fb7a1aeb1642d5dcf787f7337e991ecc9efd73d19704a2ce7afbbb60e27f28eaa78f357fbfaf9a998bb8f4d921e53a527db8a8ea65af4053af51b80364ae1de86534b1429870e9726b4aeb689799809486aeb89ec322e632f3f25ef5c6ab610c1b71116a930559bc633e061e13f9c30d3d61d5be69f1c4443219d7fbaa5b5fd43f0d02516e3262fbfc9ced2f56586ef6c8896a82990d34737e572cbc26be19bc333bfc72d0b9145e01d6ccf8e1b87f3c1a83e3280000000600bb00ff7f00001200bb00ff07ffff03000300001005000900000052007f002a0100720603030303030372060303030303037e155e20800802110000010000008004000000010000802d1a008018b0040000000000000600ae0004000000080020000000062a0107250300ab07000059017f006804e70d0200ddd255b61c60e1a4a4a36ef23a586b8f8765abc441fe8ae7ee9866f58974d55b1a5bc4c7d0698690c1e37ee0160682a4648a3f929726108f0e21a70e2f0db18bf0b7f37e89828f3abb5f835bd34d79d7a2b436738501564e9bdfa1609913161a4dad641cf8aa164a00dfd2860dd16fc605860e29de1364acde547d2fcb4e3105e3eddd81a5d9f6dbd1287484578c42a36965a8770aab420be777869a96ba40a1d6abdc23d753d39a1e970866afd6e8477ffd8b0fd82c9ce386ccce6fb9020cf53c5c8125489c9f03b1338335d4af3ec441e08937030174056a8131090133e1ed942933134f14e0d63f0ab9663e5c0128b698ca2ecb83564c950c4a53056ecb291ae7a3b744e804d32e38e3b3cfa74397aa97f98028fe88c08ba346c66632d08e49f74442733de10424e150483d11ad110c1ac53fcd156f65357a598e511d5537992abb75040100810068041d0201fc00000007000f002a0102003f000f00760605060800790b7107ff00ff000102407606090223000700030103060200803c0400046405250301b70372060303030303037206030303030303007000b9800800ba00030001001000bb008100cf0000004000060003001600ba0006007c8081000600ec000002400025f9ff0300000e00bb000002e5070800ce00020000001600bb000100000408007f000400c8748d060800030000000a00ba006900fcff090000000800ba0018213f00"], 0x8d8}, 0x1, 0x0, 0x0, 0x4040014}, 0x80) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) r3 = getpid() process_vm_readv(r3, &(0x7f0000008400)=[{0x0}], 0x1, 0x0, 0x0, 0x0) (async) pidfd_open(r3, 0x0) [ 2796.121920][T10607] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x4c00}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2796.215657][T10607] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2796.238736][T10607] CPU: 0 PID: 10607 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2796.248868][T10607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2796.258952][T10607] Call Trace: [ 2796.262257][T10607] [ 2796.265211][T10607] dump_stack_lvl+0x125/0x1b0 [ 2796.269932][T10607] sysfs_warn_dup+0x7f/0xa0 [ 2796.274480][T10607] sysfs_create_dir_ns+0x247/0x2a0 [ 2796.279625][T10607] ? sysfs_create_mount_point+0xb0/0xb0 [ 2796.285198][T10607] ? spin_bug+0x1d0/0x1d0 [ 2796.289579][T10607] ? net_namespace+0x12/0x40 [ 2796.294206][T10607] ? device_namespace+0x8d/0xc0 [ 2796.299101][T10607] kobject_add_internal+0x2c8/0x960 [ 2796.304345][T10607] kobject_add+0x16f/0x240 [ 2796.308825][T10607] ? kset_create_and_add+0x190/0x190 [ 2796.314157][T10607] ? do_raw_spin_unlock+0x173/0x230 [ 2796.319401][T10607] ? kobject_put+0xbe/0x440 [ 2796.323952][T10607] device_add+0x289/0x1aa0 [ 2796.328394][T10607] ? device_initialize+0x510/0x510 [ 2796.333547][T10607] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2796.340430][T10607] ? __init_waitqueue_head+0xca/0x150 [ 2796.345868][T10607] netdev_register_kobject+0x183/0x3f0 [ 2796.351368][T10607] register_netdevice+0xbdf/0x14a0 [ 2796.356512][T10607] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2796.362532][T10607] veth_newlink+0x4ef/0xa00 [ 2796.367066][T10607] ? veth_set_features+0x2d0/0x2d0 [ 2796.372214][T10607] ? rtnl_create_link+0xc9c/0xfd0 [ 2796.377272][T10607] ? __rtnl_newlink+0x108a/0x1930 [ 2796.382335][T10607] ? rtnl_newlink+0x67/0xa0 [ 2796.386936][T10607] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2796.392170][T10607] ? alloc_netdev_mqs+0xee6/0x1290 [ 2796.397325][T10607] ? rtnl_create_link+0xa6d/0xfd0 [ 2796.402386][T10607] ? veth_set_features+0x2d0/0x2d0 [ 2796.407532][T10607] __rtnl_newlink+0x1173/0x1930 20:50:16 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) signalfd4(r1, &(0x7f0000000040)={[0x9]}, 0x8, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) [ 2796.412437][T10607] ? rtnl_link_unregister+0x260/0x260 [ 2796.417889][T10607] rtnl_newlink+0x67/0xa0 [ 2796.422253][T10607] ? __rtnl_newlink+0x1930/0x1930 [ 2796.427316][T10607] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2796.432295][T10607] ? rtnl_getlink+0xb40/0xb40 [ 2796.437029][T10607] netlink_rcv_skb+0x16b/0x440 [ 2796.441821][T10607] ? rtnl_getlink+0xb40/0xb40 [ 2796.446533][T10607] ? netlink_ack+0x1370/0x1370 [ 2796.451345][T10607] ? netlink_deliver_tap+0x1a0/0xd00 [ 2796.456757][T10607] netlink_unicast+0x53b/0x810 [ 2796.461554][T10607] ? netlink_attachskb+0x880/0x880 [ 2796.466691][T10607] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2796.472615][T10607] ? __phys_addr_symbol+0x30/0x70 [ 2796.477671][T10607] ? __check_object_size+0x323/0x730 [ 2796.483003][T10607] netlink_sendmsg+0x93c/0xe40 [ 2796.487804][T10607] ? netlink_unicast+0x810/0x810 [ 2796.492778][T10607] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2796.498089][T10607] ? netlink_unicast+0x810/0x810 [ 2796.503059][T10607] __sock_sendmsg+0xd5/0x180 [ 2796.507691][T10607] ____sys_sendmsg+0x6ac/0x940 [ 2796.512496][T10607] ? copy_msghdr_from_user+0x10b/0x160 [ 2796.517983][T10607] ? kernel_sendmsg+0x50/0x50 [ 2796.522700][T10607] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2796.528728][T10607] ___sys_sendmsg+0x135/0x1d0 [ 2796.533436][T10607] ? do_recvmmsg+0x740/0x740 [ 2796.538052][T10607] ? find_held_lock+0x2d/0x110 [ 2796.542880][T10607] ? __fget_light+0xe6/0x260 [ 2796.547510][T10607] __sys_sendmsg+0x117/0x1e0 [ 2796.552132][T10607] ? __sys_sendmsg_sock+0x30/0x30 [ 2796.557192][T10607] ? xfd_validate_state+0x5d/0x180 [ 2796.562365][T10607] ? syscall_enter_from_user_mode+0x26/0x80 [ 2796.568301][T10607] do_syscall_64+0x3f/0x110 [ 2796.572839][T10607] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2796.578770][T10607] RIP: 0033:0x7f6554c7cae9 [ 2796.583212][T10607] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2796.602855][T10607] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:50:17 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async, rerun: 32) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) signalfd4(r1, &(0x7f0000000040)={[0x9]}, 0x8, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) 20:50:17 executing program 2: pipe(&(0x7f0000000140)) r0 = socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) (async) r3 = socket$rxrpc(0x21, 0x2, 0xa) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000080)) (async) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r8, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRESDEC=r2, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES16=r8, @ANYRES8=r0], 0x2c}}, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) (async) sendfile(r5, r4, 0x0, 0x100000002) [ 2796.611304][T10607] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2796.619314][T10607] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2796.627313][T10607] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2796.635308][T10607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2796.643303][T10607] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2796.651320][T10607] [ 2796.693533][T10607] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2796.737929][T10614] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x6800}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x6c, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:17 executing program 2: pipe(&(0x7f0000000140)) r0 = socket$netlink(0x10, 0x3, 0x0) (async, rerun: 32) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async, rerun: 32) socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) socket$inet6_dccp(0xa, 0x6, 0x0) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r2 = socket$l2tp(0x2, 0x2, 0x73) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) (async) r3 = socket$rxrpc(0x21, 0x2, 0xa) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000080)) (async) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r8, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRESDEC=r2, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES16=r8, @ANYRES8=r0], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) (async) sendfile(r5, r4, 0x0, 0x100000002) 20:50:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x6c00}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2796.904745][T10640] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2796.948398][T10640] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2796.990060][T10640] CPU: 1 PID: 10640 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2797.000198][T10640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2797.010260][T10640] Call Trace: [ 2797.013542][T10640] [ 2797.016485][T10640] dump_stack_lvl+0x125/0x1b0 [ 2797.021180][T10640] sysfs_warn_dup+0x7f/0xa0 [ 2797.025714][T10640] sysfs_create_dir_ns+0x247/0x2a0 [ 2797.030830][T10640] ? sysfs_create_mount_point+0xb0/0xb0 [ 2797.036383][T10640] ? spin_bug+0x1d0/0x1d0 [ 2797.040732][T10640] ? net_namespace+0x12/0x40 [ 2797.045334][T10640] ? device_namespace+0x8d/0xc0 [ 2797.050197][T10640] kobject_add_internal+0x2c8/0x960 [ 2797.055414][T10640] kobject_add+0x16f/0x240 [ 2797.059843][T10640] ? kset_create_and_add+0x190/0x190 [ 2797.065138][T10640] ? do_raw_spin_unlock+0x173/0x230 [ 2797.070355][T10640] ? kobject_put+0xbe/0x440 [ 2797.074873][T10640] device_add+0x289/0x1aa0 [ 2797.079294][T10640] ? device_initialize+0x510/0x510 [ 2797.084415][T10640] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2797.091270][T10640] ? __init_waitqueue_head+0xca/0x150 [ 2797.096656][T10640] netdev_register_kobject+0x183/0x3f0 [ 2797.102129][T10640] register_netdevice+0xbdf/0x14a0 [ 2797.107249][T10640] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2797.113154][T10640] veth_newlink+0x4ef/0xa00 [ 2797.117674][T10640] ? veth_set_features+0x2d0/0x2d0 [ 2797.122791][T10640] ? rtnl_create_link+0xc9c/0xfd0 [ 2797.127827][T10640] ? __rtnl_newlink+0x108a/0x1930 [ 2797.132861][T10640] ? rtnl_newlink+0x67/0xa0 [ 2797.137425][T10640] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2797.142645][T10640] ? alloc_netdev_mqs+0xee6/0x1290 [ 2797.147781][T10640] ? rtnl_create_link+0xa6d/0xfd0 [ 2797.152817][T10640] ? veth_set_features+0x2d0/0x2d0 [ 2797.157937][T10640] __rtnl_newlink+0x1173/0x1930 [ 2797.162813][T10640] ? rtnl_link_unregister+0x260/0x260 [ 2797.168223][T10640] rtnl_newlink+0x67/0xa0 [ 2797.172562][T10640] ? __rtnl_newlink+0x1930/0x1930 [ 2797.177597][T10640] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2797.182558][T10640] ? rtnl_getlink+0xb40/0xb40 [ 2797.187259][T10640] netlink_rcv_skb+0x16b/0x440 [ 2797.192026][T10640] ? rtnl_getlink+0xb40/0xb40 [ 2797.196716][T10640] ? netlink_ack+0x1370/0x1370 [ 2797.201498][T10640] ? netlink_deliver_tap+0x1a0/0xd00 [ 2797.206795][T10640] netlink_unicast+0x53b/0x810 [ 2797.211566][T10640] ? netlink_attachskb+0x880/0x880 [ 2797.216681][T10640] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2797.222585][T10640] ? __phys_addr_symbol+0x30/0x70 [ 2797.227624][T10640] ? __check_object_size+0x323/0x730 [ 2797.232934][T10640] netlink_sendmsg+0x93c/0xe40 [ 2797.237710][T10640] ? netlink_unicast+0x810/0x810 [ 2797.242664][T10640] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2797.247955][T10640] ? netlink_unicast+0x810/0x810 [ 2797.253244][T10640] __sock_sendmsg+0xd5/0x180 [ 2797.257852][T10640] ____sys_sendmsg+0x6ac/0x940 [ 2797.262641][T10640] ? copy_msghdr_from_user+0x10b/0x160 [ 2797.268105][T10640] ? kernel_sendmsg+0x50/0x50 [ 2797.272802][T10640] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2797.278798][T10640] ___sys_sendmsg+0x135/0x1d0 [ 2797.283479][T10640] ? do_recvmmsg+0x740/0x740 [ 2797.288072][T10640] ? find_held_lock+0x2d/0x110 [ 2797.292867][T10640] ? __fget_light+0xe6/0x260 [ 2797.297471][T10640] __sys_sendmsg+0x117/0x1e0 [ 2797.302068][T10640] ? __sys_sendmsg_sock+0x30/0x30 [ 2797.307094][T10640] ? xfd_validate_state+0x5d/0x180 [ 2797.312242][T10640] ? syscall_enter_from_user_mode+0x26/0x80 [ 2797.318152][T10640] do_syscall_64+0x3f/0x110 [ 2797.322670][T10640] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2797.328587][T10640] RIP: 0033:0x7f6554c7cae9 [ 2797.333003][T10640] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2797.352615][T10640] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2797.361037][T10640] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2797.369014][T10640] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2797.376985][T10640] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 20:50:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x7400}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:18 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) signalfd4(r1, &(0x7f0000000040)={[0x9]}, 0x8, 0x0) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) [ 2797.384965][T10640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2797.392932][T10640] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2797.401008][T10640] [ 2797.414422][T10640] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:18 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r0, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r2, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) close(r2) r3 = socket$rxrpc(0x21, 0x2, 0xa) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r8], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) 20:50:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x7a00}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:18 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) openat(0xffffffffffffffff, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x6) r1 = epoll_create(0x92e) ioctl$BTRFS_IOC_INO_PATHS(r1, 0xc0389423, &(0x7f0000000040)={0x9, 0x18, [0x1, 0xffffffffffff0000, 0x7fffffff, 0x80], &(0x7f0000000000)=[0x0, 0x0, 0x0]}) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) ioprio_set$pid(0x2, 0xffffffffffffffff, 0x4007) 20:50:18 executing program 2: pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r0, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r2, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) close(r2) r3 = socket$rxrpc(0x21, 0x2, 0xa) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r8], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) 20:50:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x40000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2797.628119][T10642] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x74, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x800000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:18 executing program 2: pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) (async) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r0, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) openat(r0, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r2, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) close(r2) socket$rxrpc(0x21, 0x2, 0xa) (async) r3 = socket$rxrpc(0x21, 0x2, 0xa) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r8], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) (async) sendfile(r5, r4, 0x0, 0x100000002) [ 2797.842589][T10678] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2797.870008][T10678] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2797.886543][T10678] CPU: 1 PID: 10678 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2797.896686][T10678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2797.906773][T10678] Call Trace: [ 2797.910071][T10678] [ 2797.913016][T10678] dump_stack_lvl+0x125/0x1b0 [ 2797.917733][T10678] sysfs_warn_dup+0x7f/0xa0 [ 2797.922285][T10678] sysfs_create_dir_ns+0x247/0x2a0 [ 2797.927430][T10678] ? sysfs_create_mount_point+0xb0/0xb0 [ 2797.933013][T10678] ? spin_bug+0x1d0/0x1d0 [ 2797.937397][T10678] ? net_namespace+0x12/0x40 [ 2797.942033][T10678] ? device_namespace+0x8d/0xc0 [ 2797.947018][T10678] kobject_add_internal+0x2c8/0x960 [ 2797.952261][T10678] kobject_add+0x16f/0x240 [ 2797.956716][T10678] ? kset_create_and_add+0x190/0x190 [ 2797.962050][T10678] ? do_raw_spin_unlock+0x173/0x230 [ 2797.967303][T10678] ? kobject_put+0xbe/0x440 [ 2797.971852][T10678] device_add+0x289/0x1aa0 [ 2797.976475][T10678] ? device_initialize+0x510/0x510 [ 2797.981628][T10678] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2797.988521][T10678] ? __init_waitqueue_head+0xca/0x150 [ 2797.993940][T10678] netdev_register_kobject+0x183/0x3f0 [ 2797.999441][T10678] register_netdevice+0xbdf/0x14a0 [ 2798.004595][T10678] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2798.010616][T10678] veth_newlink+0x4ef/0xa00 [ 2798.015153][T10678] ? veth_set_features+0x2d0/0x2d0 [ 2798.020294][T10678] ? rtnl_create_link+0xc9c/0xfd0 [ 2798.025346][T10678] ? __rtnl_newlink+0x108a/0x1930 [ 2798.030380][T10678] ? rtnl_newlink+0x67/0xa0 [ 2798.034919][T10678] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2798.040128][T10678] ? alloc_netdev_mqs+0xee6/0x1290 [ 2798.045328][T10678] ? rtnl_create_link+0xa6d/0xfd0 [ 2798.050388][T10678] ? veth_set_features+0x2d0/0x2d0 [ 2798.055514][T10678] __rtnl_newlink+0x1173/0x1930 [ 2798.060376][T10678] ? rtnl_link_unregister+0x260/0x260 [ 2798.065768][T10678] rtnl_newlink+0x67/0xa0 [ 2798.070102][T10678] ? __rtnl_newlink+0x1930/0x1930 [ 2798.075141][T10678] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2798.080112][T10678] ? rtnl_getlink+0xb40/0xb40 [ 2798.084804][T10678] netlink_rcv_skb+0x16b/0x440 [ 2798.089594][T10678] ? rtnl_getlink+0xb40/0xb40 [ 2798.094308][T10678] ? netlink_ack+0x1370/0x1370 [ 2798.099122][T10678] ? netlink_deliver_tap+0x1a0/0xd00 [ 2798.104442][T10678] netlink_unicast+0x53b/0x810 [ 2798.109225][T10678] ? netlink_attachskb+0x880/0x880 [ 2798.114334][T10678] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2798.120246][T10678] ? __phys_addr_symbol+0x30/0x70 [ 2798.125269][T10678] ? __check_object_size+0x323/0x730 [ 2798.130560][T10678] netlink_sendmsg+0x93c/0xe40 [ 2798.135324][T10678] ? netlink_unicast+0x810/0x810 [ 2798.140349][T10678] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2798.145646][T10678] ? netlink_unicast+0x810/0x810 [ 2798.150621][T10678] __sock_sendmsg+0xd5/0x180 [ 2798.155251][T10678] ____sys_sendmsg+0x6ac/0x940 [ 2798.160064][T10678] ? copy_msghdr_from_user+0x10b/0x160 [ 2798.165549][T10678] ? kernel_sendmsg+0x50/0x50 [ 2798.170242][T10678] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2798.176227][T10678] ___sys_sendmsg+0x135/0x1d0 [ 2798.180909][T10678] ? do_recvmmsg+0x740/0x740 [ 2798.185491][T10678] ? find_held_lock+0x2d/0x110 [ 2798.190281][T10678] ? __fget_light+0xe6/0x260 [ 2798.194892][T10678] __sys_sendmsg+0x117/0x1e0 [ 2798.199511][T10678] ? __sys_sendmsg_sock+0x30/0x30 [ 2798.204557][T10678] ? xfd_validate_state+0x5d/0x180 [ 2798.209732][T10678] ? syscall_enter_from_user_mode+0x26/0x80 [ 2798.215660][T10678] do_syscall_64+0x3f/0x110 [ 2798.220188][T10678] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2798.226085][T10678] RIP: 0033:0x7f6554c7cae9 [ 2798.230524][T10678] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2798.250140][T10678] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2798.258574][T10678] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2798.266541][T10678] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2798.274506][T10678] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2798.282467][T10678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 20:50:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:18 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) openat(0xffffffffffffffff, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) openat(0xffffffffffffffff, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x6) r1 = epoll_create(0x92e) ioctl$BTRFS_IOC_INO_PATHS(r1, 0xc0389423, &(0x7f0000000040)={0x9, 0x18, [0x1, 0xffffffffffff0000, 0x7fffffff, 0x80], &(0x7f0000000000)=[0x0, 0x0, 0x0]}) (async) ioctl$BTRFS_IOC_INO_PATHS(r1, 0xc0389423, &(0x7f0000000040)={0x9, 0x18, [0x1, 0xffffffffffff0000, 0x7fffffff, 0x80], &(0x7f0000000000)=[0x0, 0x0, 0x0]}) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) ioprio_set$pid(0x2, 0xffffffffffffffff, 0x4007) 20:50:18 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0xa) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000200)={0xffffffffffffffff, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r8, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x54}, 0x20000c11) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0b00005ac2200000008acd1765aef3ee9e", @ANYRES32=r9], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) 20:50:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x1000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2798.290441][T10678] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2798.298458][T10678] [ 2798.325758][T10678] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2798.395271][T10687] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x2000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x7a, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:19 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async, rerun: 32) openat(0xffffffffffffffff, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (rerun: 32) sendfile(r0, 0xffffffffffffffff, 0x0, 0x6) (async) r1 = epoll_create(0x92e) ioctl$BTRFS_IOC_INO_PATHS(r1, 0xc0389423, &(0x7f0000000040)={0x9, 0x18, [0x1, 0xffffffffffff0000, 0x7fffffff, 0x80], &(0x7f0000000000)=[0x0, 0x0, 0x0]}) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) ioprio_set$pid(0x2, 0xffffffffffffffff, 0x4007) 20:50:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x3000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2798.623469][T10708] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2798.638970][T10705] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x4000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2798.738280][T10705] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2798.776820][T10705] CPU: 1 PID: 10705 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2798.786973][T10705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2798.797061][T10705] Call Trace: [ 2798.800453][T10705] [ 2798.803410][T10705] dump_stack_lvl+0x125/0x1b0 [ 2798.808127][T10705] sysfs_warn_dup+0x7f/0xa0 [ 2798.812764][T10705] sysfs_create_dir_ns+0x247/0x2a0 [ 2798.817911][T10705] ? sysfs_create_mount_point+0xb0/0xb0 [ 2798.823494][T10705] ? spin_bug+0x1d0/0x1d0 [ 2798.827865][T10705] ? net_namespace+0x12/0x40 [ 2798.832494][T10705] ? device_namespace+0x8d/0xc0 20:50:19 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, 0x0) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000100)={0x9, "ae2363a5f441424a5ba39a0aee8be4e8bd5675ac0aa89ec654f7c1ea76cbbabc", 0x200, 0xffffff7b, 0x3, 0x10, 0x5}) [ 2798.837389][T10705] kobject_add_internal+0x2c8/0x960 [ 2798.842637][T10705] kobject_add+0x16f/0x240 [ 2798.847096][T10705] ? kset_create_and_add+0x190/0x190 [ 2798.852423][T10705] ? do_raw_spin_unlock+0x173/0x230 [ 2798.857670][T10705] ? kobject_put+0xbe/0x440 [ 2798.862228][T10705] device_add+0x289/0x1aa0 [ 2798.866680][T10705] ? device_initialize+0x510/0x510 [ 2798.871834][T10705] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2798.878724][T10705] ? __init_waitqueue_head+0xca/0x150 [ 2798.884168][T10705] netdev_register_kobject+0x183/0x3f0 [ 2798.889659][T10705] register_netdevice+0xbdf/0x14a0 [ 2798.894784][T10705] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2798.900690][T10705] veth_newlink+0x4ef/0xa00 [ 2798.905205][T10705] ? veth_set_features+0x2d0/0x2d0 [ 2798.910318][T10705] ? rtnl_create_link+0xc9c/0xfd0 [ 2798.915349][T10705] ? __rtnl_newlink+0x108a/0x1930 [ 2798.920387][T10705] ? rtnl_newlink+0x67/0xa0 [ 2798.924952][T10705] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2798.930161][T10705] ? alloc_netdev_mqs+0xee6/0x1290 [ 2798.935285][T10705] ? rtnl_create_link+0xa6d/0xfd0 [ 2798.940322][T10705] ? veth_set_features+0x2d0/0x2d0 [ 2798.945449][T10705] __rtnl_newlink+0x1173/0x1930 [ 2798.950323][T10705] ? rtnl_link_unregister+0x260/0x260 [ 2798.955747][T10705] rtnl_newlink+0x67/0xa0 [ 2798.960106][T10705] ? __rtnl_newlink+0x1930/0x1930 [ 2798.965161][T10705] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2798.970129][T10705] ? rtnl_getlink+0xb40/0xb40 [ 2798.974838][T10705] netlink_rcv_skb+0x16b/0x440 [ 2798.979619][T10705] ? rtnl_getlink+0xb40/0xb40 [ 2798.984316][T10705] ? netlink_ack+0x1370/0x1370 [ 2798.989105][T10705] ? netlink_deliver_tap+0x1a0/0xd00 [ 2798.994402][T10705] netlink_unicast+0x53b/0x810 [ 2798.999179][T10705] ? netlink_attachskb+0x880/0x880 [ 2799.004293][T10705] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2799.010196][T10705] ? __phys_addr_symbol+0x30/0x70 [ 2799.015230][T10705] ? __check_object_size+0x323/0x730 [ 2799.020534][T10705] netlink_sendmsg+0x93c/0xe40 [ 2799.025310][T10705] ? netlink_unicast+0x810/0x810 [ 2799.030258][T10705] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2799.035551][T10705] ? netlink_unicast+0x810/0x810 [ 2799.040495][T10705] __sock_sendmsg+0xd5/0x180 [ 2799.045099][T10705] ____sys_sendmsg+0x6ac/0x940 [ 2799.049882][T10705] ? copy_msghdr_from_user+0x10b/0x160 [ 2799.055345][T10705] ? kernel_sendmsg+0x50/0x50 [ 2799.060041][T10705] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2799.066136][T10705] ___sys_sendmsg+0x135/0x1d0 [ 2799.070844][T10705] ? do_recvmmsg+0x740/0x740 [ 2799.075440][T10705] ? find_held_lock+0x2d/0x110 [ 2799.080269][T10705] ? __fget_light+0xe6/0x260 [ 2799.084893][T10705] __sys_sendmsg+0x117/0x1e0 [ 2799.089505][T10705] ? __sys_sendmsg_sock+0x30/0x30 [ 2799.094546][T10705] ? xfd_validate_state+0x5d/0x180 [ 2799.099709][T10705] ? syscall_enter_from_user_mode+0x26/0x80 [ 2799.105630][T10705] do_syscall_64+0x3f/0x110 [ 2799.110152][T10705] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2799.116063][T10705] RIP: 0033:0x7f6554c7cae9 [ 2799.120482][T10705] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2799.140099][T10705] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2799.148521][T10705] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2799.156494][T10705] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2799.164466][T10705] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2799.172527][T10705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2799.180499][T10705] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 20:50:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x5000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2799.188489][T10705] 20:50:19 executing program 2: pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) (async) r0 = socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0xa) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000200)={0xffffffffffffffff, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r8, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x54}, 0x20000c11) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000080)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0b00005ac2200000008acd1765aef3ee9e", @ANYRES32=r9], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) (async) sendfile(r5, r4, 0x0, 0x100000002) [ 2799.244423][T10705] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:19 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, 0x0) (async) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000100)={0x9, "ae2363a5f441424a5ba39a0aee8be4e8bd5675ac0aa89ec654f7c1ea76cbbabc", 0x200, 0xffffff7b, 0x3, 0x10, 0x5}) 20:50:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x6000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x7000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x300, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:20 executing program 2: pipe(&(0x7f0000000140)) (async) socket$netlink(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) r0 = socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 64) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 32) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) (async, rerun: 32) r3 = socket$rxrpc(0x21, 0x2, 0xa) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) (async) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000200)={0xffffffffffffffff, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r8, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x54}, 0x20000c11) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0b00005ac2200000008acd1765aef3ee9e", @ANYRES32=r9], 0x2c}}, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r3], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) 20:50:20 executing program 0: memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000100)={0x9, "ae2363a5f441424a5ba39a0aee8be4e8bd5675ac0aa89ec654f7c1ea76cbbabc", 0x200, 0xffffff7b, 0x3, 0x10, 0x5}) 20:50:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81ffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x8000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2799.647211][T10744] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x48000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:20 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000000)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) [ 2799.707824][T10744] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2799.733061][T10744] CPU: 0 PID: 10744 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2799.743193][T10744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2799.753279][T10744] Call Trace: 20:50:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x4c000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2799.756588][T10744] [ 2799.759546][T10744] dump_stack_lvl+0x125/0x1b0 [ 2799.764261][T10744] sysfs_warn_dup+0x7f/0xa0 [ 2799.768808][T10744] sysfs_create_dir_ns+0x247/0x2a0 [ 2799.773958][T10744] ? sysfs_create_mount_point+0xb0/0xb0 [ 2799.779534][T10744] ? spin_bug+0x1d0/0x1d0 [ 2799.783921][T10744] ? net_namespace+0x12/0x40 [ 2799.788549][T10744] ? device_namespace+0x8d/0xc0 [ 2799.793442][T10744] kobject_add_internal+0x2c8/0x960 [ 2799.798688][T10744] kobject_add+0x16f/0x240 [ 2799.803144][T10744] ? kset_create_and_add+0x190/0x190 [ 2799.808472][T10744] ? do_raw_spin_unlock+0x173/0x230 [ 2799.813714][T10744] ? kobject_put+0xbe/0x440 [ 2799.818267][T10744] device_add+0x289/0x1aa0 [ 2799.822716][T10744] ? device_initialize+0x510/0x510 [ 2799.827873][T10744] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2799.834764][T10744] ? __init_waitqueue_head+0xca/0x150 [ 2799.840192][T10744] netdev_register_kobject+0x183/0x3f0 [ 2799.845704][T10744] register_netdevice+0xbdf/0x14a0 [ 2799.850854][T10744] ? unregister_netdevice_queue+0x3c0/0x3c0 20:50:20 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), r3) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f00000002c0)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="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"/267, @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:50:20 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000000)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) 20:50:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x68000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2799.856787][T10744] veth_newlink+0x4ef/0xa00 [ 2799.861333][T10744] ? veth_set_features+0x2d0/0x2d0 [ 2799.866477][T10744] ? rtnl_create_link+0xc9c/0xfd0 [ 2799.871536][T10744] ? __rtnl_newlink+0x108a/0x1930 [ 2799.876594][T10744] ? rtnl_newlink+0x67/0xa0 [ 2799.881197][T10744] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2799.886438][T10744] ? alloc_netdev_mqs+0xee6/0x1290 [ 2799.891590][T10744] ? rtnl_create_link+0xa6d/0xfd0 [ 2799.896655][T10744] ? veth_set_features+0x2d0/0x2d0 [ 2799.901820][T10744] __rtnl_newlink+0x1173/0x1930 [ 2799.906724][T10744] ? rtnl_link_unregister+0x260/0x260 [ 2799.912180][T10744] rtnl_newlink+0x67/0xa0 [ 2799.916550][T10744] ? __rtnl_newlink+0x1930/0x1930 [ 2799.921618][T10744] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2799.926600][T10744] ? rtnl_getlink+0xb40/0xb40 [ 2799.931339][T10744] netlink_rcv_skb+0x16b/0x440 [ 2799.936141][T10744] ? rtnl_getlink+0xb40/0xb40 [ 2799.940870][T10744] ? netlink_ack+0x1370/0x1370 [ 2799.945691][T10744] ? netlink_deliver_tap+0x1a0/0xd00 [ 2799.951027][T10744] netlink_unicast+0x53b/0x810 [ 2799.955826][T10744] ? netlink_attachskb+0x880/0x880 [ 2799.960972][T10744] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2799.966899][T10744] ? __phys_addr_symbol+0x30/0x70 [ 2799.971961][T10744] ? __check_object_size+0x323/0x730 [ 2799.977298][T10744] netlink_sendmsg+0x93c/0xe40 [ 2799.982106][T10744] ? netlink_unicast+0x810/0x810 [ 2799.987086][T10744] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2799.992496][T10744] ? netlink_unicast+0x810/0x810 [ 2799.997466][T10744] __sock_sendmsg+0xd5/0x180 [ 2800.002081][T10744] ____sys_sendmsg+0x6ac/0x940 [ 2800.006864][T10744] ? copy_msghdr_from_user+0x10b/0x160 [ 2800.012349][T10744] ? kernel_sendmsg+0x50/0x50 [ 2800.017048][T10744] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2800.024528][T10744] ___sys_sendmsg+0x135/0x1d0 [ 2800.029217][T10744] ? do_recvmmsg+0x740/0x740 [ 2800.033812][T10744] ? find_held_lock+0x2d/0x110 [ 2800.038624][T10744] ? __fget_light+0xe6/0x260 [ 2800.043247][T10744] __sys_sendmsg+0x117/0x1e0 [ 2800.047859][T10744] ? __sys_sendmsg_sock+0x30/0x30 [ 2800.052894][T10744] ? xfd_validate_state+0x5d/0x180 [ 2800.058045][T10744] ? syscall_enter_from_user_mode+0x26/0x80 [ 2800.063966][T10744] do_syscall_64+0x3f/0x110 [ 2800.068502][T10744] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2800.074412][T10744] RIP: 0033:0x7f6554c7cae9 [ 2800.078852][T10744] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2800.098474][T10744] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2800.106898][T10744] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2800.114991][T10744] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2800.122963][T10744] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2800.130936][T10744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2800.138910][T10744] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2800.146899][T10744] [ 2800.165759][T10744] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x500, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x6c000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:20 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000000)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000000)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) 20:50:21 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82ffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x74000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2800.468073][T10788] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2800.511381][T10788] CPU: 0 PID: 10788 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2800.521529][T10788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2800.531610][T10788] Call Trace: [ 2800.534897][T10788] [ 2800.537831][T10788] dump_stack_lvl+0x125/0x1b0 [ 2800.542523][T10788] sysfs_warn_dup+0x7f/0xa0 [ 2800.547045][T10788] sysfs_create_dir_ns+0x247/0x2a0 [ 2800.552162][T10788] ? sysfs_create_mount_point+0xb0/0xb0 [ 2800.557718][T10788] ? spin_bug+0x1d0/0x1d0 [ 2800.562065][T10788] ? net_namespace+0x12/0x40 [ 2800.566671][T10788] ? device_namespace+0x8d/0xc0 [ 2800.571537][T10788] kobject_add_internal+0x2c8/0x960 [ 2800.576752][T10788] kobject_add+0x16f/0x240 [ 2800.581182][T10788] ? kset_create_and_add+0x190/0x190 [ 2800.586486][T10788] ? do_raw_spin_unlock+0x173/0x230 [ 2800.591702][T10788] ? kobject_put+0xbe/0x440 [ 2800.596231][T10788] device_add+0x289/0x1aa0 [ 2800.600661][T10788] ? device_initialize+0x510/0x510 [ 2800.605789][T10788] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2800.612648][T10788] ? __init_waitqueue_head+0xca/0x150 [ 2800.618040][T10788] netdev_register_kobject+0x183/0x3f0 [ 2800.623512][T10788] register_netdevice+0xbdf/0x14a0 [ 2800.628634][T10788] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2800.634541][T10788] veth_newlink+0x4ef/0xa00 [ 2800.639052][T10788] ? veth_set_features+0x2d0/0x2d0 [ 2800.644171][T10788] ? rtnl_create_link+0xc9c/0xfd0 [ 2800.649209][T10788] ? __rtnl_newlink+0x108a/0x1930 [ 2800.654252][T10788] ? rtnl_newlink+0x67/0xa0 [ 2800.658812][T10788] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2800.664022][T10788] ? alloc_netdev_mqs+0xee6/0x1290 [ 2800.669154][T10788] ? rtnl_create_link+0xa6d/0xfd0 [ 2800.674191][T10788] ? veth_set_features+0x2d0/0x2d0 [ 2800.679315][T10788] __rtnl_newlink+0x1173/0x1930 [ 2800.684194][T10788] ? rtnl_link_unregister+0x260/0x260 [ 2800.689636][T10788] rtnl_newlink+0x67/0xa0 [ 2800.693996][T10788] ? __rtnl_newlink+0x1930/0x1930 [ 2800.699054][T10788] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2800.704025][T10788] ? rtnl_getlink+0xb40/0xb40 [ 2800.708740][T10788] netlink_rcv_skb+0x16b/0x440 [ 2800.713518][T10788] ? rtnl_getlink+0xb40/0xb40 [ 2800.718219][T10788] ? netlink_ack+0x1370/0x1370 [ 2800.723012][T10788] ? netlink_deliver_tap+0x1a0/0xd00 [ 2800.728320][T10788] netlink_unicast+0x53b/0x810 [ 2800.733098][T10788] ? netlink_attachskb+0x880/0x880 [ 2800.738213][T10788] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2800.744122][T10788] ? __phys_addr_symbol+0x30/0x70 [ 2800.749166][T10788] ? __check_object_size+0x323/0x730 [ 2800.754476][T10788] netlink_sendmsg+0x93c/0xe40 [ 2800.759252][T10788] ? netlink_unicast+0x810/0x810 [ 2800.764202][T10788] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2800.769497][T10788] ? netlink_unicast+0x810/0x810 [ 2800.774443][T10788] __sock_sendmsg+0xd5/0x180 [ 2800.779059][T10788] ____sys_sendmsg+0x6ac/0x940 [ 2800.783836][T10788] ? copy_msghdr_from_user+0x10b/0x160 [ 2800.789301][T10788] ? kernel_sendmsg+0x50/0x50 [ 2800.794000][T10788] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2800.800002][T10788] ___sys_sendmsg+0x135/0x1d0 [ 2800.804691][T10788] ? do_recvmmsg+0x740/0x740 [ 2800.809319][T10788] ? find_held_lock+0x2d/0x110 [ 2800.814158][T10788] ? __fget_light+0xe6/0x260 [ 2800.818789][T10788] __sys_sendmsg+0x117/0x1e0 [ 2800.823396][T10788] ? __sys_sendmsg_sock+0x30/0x30 [ 2800.828429][T10788] ? xfd_validate_state+0x5d/0x180 [ 2800.833571][T10788] ? syscall_enter_from_user_mode+0x26/0x80 [ 2800.839484][T10788] do_syscall_64+0x3f/0x110 [ 2800.843997][T10788] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2800.849907][T10788] RIP: 0033:0x7f6554c7cae9 [ 2800.854329][T10788] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2800.873942][T10788] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2800.882363][T10788] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2800.890344][T10788] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2800.898320][T10788] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2800.906302][T10788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2800.914288][T10788] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2800.922292][T10788] 20:50:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x7a000000}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:21 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) gettid() [ 2800.985464][T10788] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:21 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) (async) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) (async) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), r3) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f00000002c0)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ffffa348f7051ed8bbb93851d175f1e9929d9f908f34e3f2d3ce76144cae04e75a492c751a8d98b18c83e7b26da5178edc90cb431a13b2a2c4cccd8b917ec88b5788894e66b420c44a0491b21c5a22bb2e122385cff8c109b686051e0a7675ef52a6cff17e96a7ac7323110a143489f5b4859a538a05000000f16b777b982ff13bb92fa383d65c253296e0146f01981c368b760389c956103d40b1bd550a8c961e6490b5ae889224b4dc63e18c1a0302f801d8d34f94bd454db3c63998d98683b2c9be175221c49433dd9f268afd6bf9111779584da27ce75553481dd0fe606be48b84cf9a9337a680e3f196ee487cba0b04bb011f7bdb143fb38fa00400"/267, @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:50:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0x7ffffff7}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2801.167147][T10799] __nla_validate_parse: 2 callbacks suppressed [ 2801.167168][T10799] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x600, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:21 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) gettid() 20:50:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0xf7ffff7f}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:21 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0, 0xffffff7f}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83ffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2801.347927][T10820] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:22 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) gettid() [ 2801.445822][T10820] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2801.478740][T10820] CPU: 0 PID: 10820 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2801.489070][T10820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2801.499153][T10820] Call Trace: [ 2801.502464][T10820] [ 2801.505420][T10820] dump_stack_lvl+0x125/0x1b0 [ 2801.510148][T10820] sysfs_warn_dup+0x7f/0xa0 [ 2801.514708][T10820] sysfs_create_dir_ns+0x247/0x2a0 [ 2801.519866][T10820] ? sysfs_create_mount_point+0xb0/0xb0 [ 2801.525445][T10820] ? spin_bug+0x1d0/0x1d0 [ 2801.529834][T10820] ? net_namespace+0x12/0x40 [ 2801.534465][T10820] ? device_namespace+0x8d/0xc0 [ 2801.539361][T10820] kobject_add_internal+0x2c8/0x960 20:50:22 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000000fc0)={'#! ', './file0', [{0x20, '\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93'}, {0x20, '\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93'}, {0x20, '}&#'}, {0x20, '&$\x10(::#]{+##*'}, {0x20, '\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93'}], 0xa, "ee75beec61efc4372269b23582335db0df8650e84397fb88410707f420c42d1501653c9001d510649214b71c8ab9d7c3633da1b175d314441bbac0fc"}, 0x863) [ 2801.544621][T10820] kobject_add+0x16f/0x240 [ 2801.549084][T10820] ? kset_create_and_add+0x190/0x190 [ 2801.554676][T10820] ? do_raw_spin_unlock+0x173/0x230 [ 2801.559924][T10820] ? kobject_put+0xbe/0x440 [ 2801.564478][T10820] device_add+0x289/0x1aa0 [ 2801.569016][T10820] ? device_initialize+0x510/0x510 [ 2801.574180][T10820] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2801.581073][T10820] ? __init_waitqueue_head+0xca/0x150 [ 2801.586498][T10820] netdev_register_kobject+0x183/0x3f0 [ 2801.592002][T10820] register_netdevice+0xbdf/0x14a0 [ 2801.597155][T10820] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2801.603112][T10820] veth_newlink+0x4ef/0xa00 [ 2801.607665][T10820] ? veth_set_features+0x2d0/0x2d0 [ 2801.612813][T10820] ? rtnl_create_link+0xc9c/0xfd0 [ 2801.617879][T10820] ? __rtnl_newlink+0x108a/0x1930 [ 2801.622945][T10820] ? rtnl_newlink+0x67/0xa0 [ 2801.627545][T10820] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2801.632793][T10820] ? alloc_netdev_mqs+0xee6/0x1290 [ 2801.637961][T10820] ? rtnl_create_link+0xa6d/0xfd0 20:50:22 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) write$binfmt_script(r0, &(0x7f0000000fc0)={'#! ', './file0', [{0x20, '\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93'}, {0x20, '\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93'}, {0x20, '}&#'}, {0x20, '&$\x10(::#]{+##*'}, {0x20, '\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93'}], 0xa, "ee75beec61efc4372269b23582335db0df8650e84397fb88410707f420c42d1501653c9001d510649214b71c8ab9d7c3633da1b175d314441bbac0fc"}, 0x863) [ 2801.643030][T10820] ? veth_set_features+0x2d0/0x2d0 [ 2801.648182][T10820] __rtnl_newlink+0x1173/0x1930 [ 2801.653184][T10820] ? rtnl_link_unregister+0x260/0x260 [ 2801.658638][T10820] rtnl_newlink+0x67/0xa0 [ 2801.663039][T10820] ? __rtnl_newlink+0x1930/0x1930 [ 2801.668101][T10820] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2801.673089][T10820] ? rtnl_getlink+0xb40/0xb40 [ 2801.677838][T10820] netlink_rcv_skb+0x16b/0x440 [ 2801.682635][T10820] ? rtnl_getlink+0xb40/0xb40 [ 2801.687355][T10820] ? netlink_ack+0x1370/0x1370 [ 2801.692186][T10820] ? netlink_deliver_tap+0x1a0/0xd00 [ 2801.697515][T10820] netlink_unicast+0x53b/0x810 [ 2801.702318][T10820] ? netlink_attachskb+0x880/0x880 [ 2801.707461][T10820] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2801.713397][T10820] ? __phys_addr_symbol+0x30/0x70 [ 2801.718456][T10820] ? __check_object_size+0x323/0x730 [ 2801.723790][T10820] netlink_sendmsg+0x93c/0xe40 [ 2801.728618][T10820] ? netlink_unicast+0x810/0x810 [ 2801.733597][T10820] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2801.738918][T10820] ? netlink_unicast+0x810/0x810 [ 2801.743916][T10820] __sock_sendmsg+0xd5/0x180 [ 2801.748550][T10820] ____sys_sendmsg+0x6ac/0x940 [ 2801.753356][T10820] ? copy_msghdr_from_user+0x10b/0x160 [ 2801.758852][T10820] ? kernel_sendmsg+0x50/0x50 [ 2801.763578][T10820] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2801.769617][T10820] ___sys_sendmsg+0x135/0x1d0 [ 2801.774340][T10820] ? do_recvmmsg+0x740/0x740 [ 2801.778965][T10820] ? find_held_lock+0x2d/0x110 [ 2801.783811][T10820] ? __fget_light+0xe6/0x260 [ 2801.788474][T10820] __sys_sendmsg+0x117/0x1e0 [ 2801.793103][T10820] ? __sys_sendmsg_sock+0x30/0x30 [ 2801.798160][T10820] ? xfd_validate_state+0x5d/0x180 [ 2801.803340][T10820] ? syscall_enter_from_user_mode+0x26/0x80 [ 2801.809296][T10820] do_syscall_64+0x3f/0x110 [ 2801.813845][T10820] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2801.819788][T10820] RIP: 0033:0x7f6554c7cae9 [ 2801.824234][T10820] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 20:50:22 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000000fc0)={'#! ', './file0', [{0x20, '\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93'}, {0x20, '\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93'}, {0x20, '}&#'}, {0x20, '&$\x10(::#]{+##*'}, {0x20, '\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93'}], 0xa, "ee75beec61efc4372269b23582335db0df8650e84397fb88410707f420c42d1501653c9001d510649214b71c8ab9d7c3633da1b175d314441bbac0fc"}, 0x863) 20:50:22 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$rxrpc(0x21, 0x2, 0xa) (async) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), r3) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f00000002c0)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="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"/267, @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) (async) sendfile(r3, r2, 0x0, 0x100000002) 20:50:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x17, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2801.843900][T10820] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2801.852357][T10820] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2801.860364][T10820] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2801.868367][T10820] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2801.876377][T10820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2801.884469][T10820] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2801.892497][T10820] [ 2802.120264][T10820] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2802.158295][T10824] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x700, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1b, 0x0, 0x0, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:22 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="2e180000", @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:50:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:22 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x20000000) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x7, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000040), 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/150, 0x96}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/179, 0xb3}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/218, 0xda}, {&(0x7f0000000700)=""/152, 0x98}], 0x7, &(0x7f00000007c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\t\x00\x00'], 0x120}, 0x0) 20:50:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84ffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x2, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2802.294419][T10862] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2802.318831][T10862] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2802.367885][T10862] CPU: 0 PID: 10862 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2802.378108][T10862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2802.388191][T10862] Call Trace: [ 2802.391494][T10862] [ 2802.394446][T10862] dump_stack_lvl+0x125/0x1b0 [ 2802.399164][T10862] sysfs_warn_dup+0x7f/0xa0 [ 2802.403713][T10862] sysfs_create_dir_ns+0x247/0x2a0 [ 2802.408858][T10862] ? sysfs_create_mount_point+0xb0/0xb0 [ 2802.414444][T10862] ? spin_bug+0x1d0/0x1d0 [ 2802.418821][T10862] ? net_namespace+0x12/0x40 [ 2802.423446][T10862] ? device_namespace+0x8d/0xc0 [ 2802.428338][T10862] kobject_add_internal+0x2c8/0x960 [ 2802.433595][T10862] kobject_add+0x16f/0x240 [ 2802.438059][T10862] ? kset_create_and_add+0x190/0x190 [ 2802.443383][T10862] ? do_raw_spin_unlock+0x173/0x230 [ 2802.448620][T10862] ? kobject_put+0xbe/0x440 [ 2802.453156][T10862] device_add+0x289/0x1aa0 [ 2802.457587][T10862] ? device_initialize+0x510/0x510 [ 2802.462721][T10862] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2802.469586][T10862] ? __init_waitqueue_head+0xca/0x150 [ 2802.474976][T10862] netdev_register_kobject+0x183/0x3f0 [ 2802.480445][T10862] register_netdevice+0xbdf/0x14a0 [ 2802.485567][T10862] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2802.491565][T10862] veth_newlink+0x4ef/0xa00 [ 2802.496080][T10862] ? veth_set_features+0x2d0/0x2d0 [ 2802.501193][T10862] ? rtnl_create_link+0xc9c/0xfd0 [ 2802.506233][T10862] ? __rtnl_newlink+0x108a/0x1930 [ 2802.511278][T10862] ? rtnl_newlink+0x67/0xa0 [ 2802.515839][T10862] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2802.521050][T10862] ? alloc_netdev_mqs+0xee6/0x1290 [ 2802.526174][T10862] ? rtnl_create_link+0xa6d/0xfd0 [ 2802.531210][T10862] ? veth_set_features+0x2d0/0x2d0 [ 2802.536337][T10862] __rtnl_newlink+0x1173/0x1930 [ 2802.541214][T10862] ? rtnl_link_unregister+0x260/0x260 [ 2802.546633][T10862] rtnl_newlink+0x67/0xa0 [ 2802.550976][T10862] ? __rtnl_newlink+0x1930/0x1930 [ 2802.556017][T10862] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2802.560974][T10862] ? rtnl_getlink+0xb40/0xb40 [ 2802.565664][T10862] ? find_held_lock+0x2d/0x110 [ 2802.570441][T10862] ? rcu_preempt_deferred_qs_irqrestore+0x684/0xdb0 [ 2802.577039][T10862] ? reacquire_held_locks+0x4b0/0x4b0 [ 2802.582426][T10862] netlink_rcv_skb+0x16b/0x440 [ 2802.587199][T10862] ? rtnl_getlink+0xb40/0xb40 [ 2802.591894][T10862] ? netlink_ack+0x1370/0x1370 [ 2802.596658][T10862] ? _raw_spin_unlock_irqrestore+0x3b/0x70 [ 2802.602496][T10862] ? __rcu_read_unlock+0x2ad/0x570 [ 2802.607621][T10862] ? netlink_deliver_tap+0x1a0/0xd00 [ 2802.612919][T10862] netlink_unicast+0x53b/0x810 [ 2802.617781][T10862] ? netlink_attachskb+0x880/0x880 [ 2802.622894][T10862] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2802.628799][T10862] ? __phys_addr_symbol+0x30/0x70 [ 2802.633831][T10862] ? __check_object_size+0x323/0x730 [ 2802.639136][T10862] netlink_sendmsg+0x93c/0xe40 [ 2802.643911][T10862] ? netlink_unicast+0x810/0x810 [ 2802.648869][T10862] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2802.654164][T10862] ? netlink_unicast+0x810/0x810 [ 2802.659638][T10862] __sock_sendmsg+0xd5/0x180 [ 2802.664256][T10862] ____sys_sendmsg+0x6ac/0x940 [ 2802.669032][T10862] ? copy_msghdr_from_user+0x10b/0x160 [ 2802.674494][T10862] ? kernel_sendmsg+0x50/0x50 [ 2802.679362][T10862] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2802.685360][T10862] ___sys_sendmsg+0x135/0x1d0 [ 2802.690050][T10862] ? do_recvmmsg+0x740/0x740 [ 2802.694642][T10862] ? find_held_lock+0x2d/0x110 [ 2802.699438][T10862] ? __fget_light+0xe6/0x260 [ 2802.704044][T10862] __sys_sendmsg+0x117/0x1e0 [ 2802.708645][T10862] ? __sys_sendmsg_sock+0x30/0x30 [ 2802.713669][T10862] ? xfd_validate_state+0x5d/0x180 [ 2802.718813][T10862] ? syscall_enter_from_user_mode+0x26/0x80 [ 2802.724725][T10862] do_syscall_64+0x3f/0x110 [ 2802.729242][T10862] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2802.735582][T10862] RIP: 0033:0x7f6554c7cae9 [ 2802.739999][T10862] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2802.759613][T10862] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2802.768035][T10862] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2802.776006][T10862] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2802.783975][T10862] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2802.791948][T10862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2802.799920][T10862] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2802.807919][T10862] [ 2802.874263][T10862] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:23 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x20000000) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x7, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000040), 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/150, 0x96}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/179, 0xb3}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/218, 0xda}, {&(0x7f0000000700)=""/152, 0x98}], 0x7, &(0x7f00000007c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\t\x00\x00'], 0x120}, 0x0) memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x20000000) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x7, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000040), 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/150, 0x96}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/179, 0xb3}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/218, 0xda}, {&(0x7f0000000700)=""/152, 0x98}], 0x7, &(0x7f00000007c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\t\x00\x00'], 0x120}, 0x0) (async) 20:50:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x3, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2802.964685][T10866] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x4, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x900, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:23 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x5, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:23 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) (async) r1 = socket$rxrpc(0x21, 0x2, 0xa) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async, rerun: 32) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="2e180000", @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:50:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2803.204484][T10883] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x6, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2803.255098][T10883] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' 20:50:23 executing program 0: memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x20000000) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x20000000) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x7, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000040), 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/150, 0x96}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/179, 0xb3}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/218, 0xda}, {&(0x7f0000000700)=""/152, 0x98}], 0x7, &(0x7f00000007c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\t\x00\x00'], 0x120}, 0x0) [ 2803.300584][T10883] CPU: 1 PID: 10883 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2803.310714][T10883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2803.320799][T10883] Call Trace: [ 2803.324099][T10883] [ 2803.327048][T10883] dump_stack_lvl+0x125/0x1b0 [ 2803.331760][T10883] sysfs_warn_dup+0x7f/0xa0 [ 2803.336312][T10883] sysfs_create_dir_ns+0x247/0x2a0 [ 2803.341455][T10883] ? sysfs_create_mount_point+0xb0/0xb0 20:50:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x7, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2803.347034][T10883] ? spin_bug+0x1d0/0x1d0 [ 2803.351407][T10883] ? net_namespace+0x12/0x40 [ 2803.356035][T10883] ? device_namespace+0x8d/0xc0 [ 2803.360931][T10883] kobject_add_internal+0x2c8/0x960 [ 2803.366182][T10883] kobject_add+0x16f/0x240 [ 2803.370635][T10883] ? kset_create_and_add+0x190/0x190 [ 2803.375962][T10883] ? do_raw_spin_unlock+0x173/0x230 [ 2803.381221][T10883] ? kobject_put+0xbe/0x440 [ 2803.385772][T10883] device_add+0x289/0x1aa0 [ 2803.390220][T10883] ? device_initialize+0x510/0x510 [ 2803.395369][T10883] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2803.402254][T10883] ? __init_waitqueue_head+0xca/0x150 [ 2803.407670][T10883] netdev_register_kobject+0x183/0x3f0 [ 2803.413170][T10883] register_netdevice+0xbdf/0x14a0 [ 2803.418318][T10883] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2803.424257][T10883] veth_newlink+0x4ef/0xa00 [ 2803.428800][T10883] ? veth_set_features+0x2d0/0x2d0 [ 2803.433936][T10883] ? rtnl_create_link+0xc9c/0xfd0 [ 2803.439003][T10883] ? __rtnl_newlink+0x108a/0x1930 [ 2803.444063][T10883] ? rtnl_newlink+0x67/0xa0 20:50:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x8, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2803.448661][T10883] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2803.453897][T10883] ? alloc_netdev_mqs+0xee6/0x1290 [ 2803.459051][T10883] ? rtnl_create_link+0xa6d/0xfd0 [ 2803.464118][T10883] ? veth_set_features+0x2d0/0x2d0 [ 2803.469260][T10883] __rtnl_newlink+0x1173/0x1930 [ 2803.474169][T10883] ? rtnl_link_unregister+0x260/0x260 [ 2803.479616][T10883] rtnl_newlink+0x67/0xa0 [ 2803.483988][T10883] ? __rtnl_newlink+0x1930/0x1930 [ 2803.489055][T10883] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2803.494037][T10883] ? rtnl_getlink+0xb40/0xb40 20:50:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x48, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2803.498768][T10883] netlink_rcv_skb+0x16b/0x440 [ 2803.503563][T10883] ? rtnl_getlink+0xb40/0xb40 [ 2803.508280][T10883] ? netlink_ack+0x1370/0x1370 [ 2803.513093][T10883] ? netlink_deliver_tap+0x1a0/0xd00 [ 2803.518419][T10883] netlink_unicast+0x53b/0x810 [ 2803.523221][T10883] ? netlink_attachskb+0x880/0x880 [ 2803.528366][T10883] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2803.534290][T10883] ? __phys_addr_symbol+0x30/0x70 [ 2803.539341][T10883] ? __check_object_size+0x323/0x730 [ 2803.544673][T10883] netlink_sendmsg+0x93c/0xe40 20:50:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x4c, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2803.549478][T10883] ? netlink_unicast+0x810/0x810 [ 2803.554450][T10883] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2803.559764][T10883] ? netlink_unicast+0x810/0x810 [ 2803.564739][T10883] __sock_sendmsg+0xd5/0x180 [ 2803.569380][T10883] ____sys_sendmsg+0x6ac/0x940 [ 2803.574190][T10883] ? copy_msghdr_from_user+0x10b/0x160 [ 2803.579677][T10883] ? kernel_sendmsg+0x50/0x50 [ 2803.584401][T10883] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2803.590429][T10883] ___sys_sendmsg+0x135/0x1d0 [ 2803.595136][T10883] ? do_recvmmsg+0x740/0x740 20:50:24 executing program 2: pipe(&(0x7f0000000140)) (async) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) (async) r1 = socket$rxrpc(0x21, 0x2, 0xa) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="2e180000", @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) (async) sendfile(r3, r2, 0x0, 0x100000002) [ 2803.599772][T10883] ? find_held_lock+0x2d/0x110 [ 2803.604613][T10883] ? __fget_light+0xe6/0x260 [ 2803.609244][T10883] __sys_sendmsg+0x117/0x1e0 [ 2803.613867][T10883] ? __sys_sendmsg_sock+0x30/0x30 [ 2803.618915][T10883] ? xfd_validate_state+0x5d/0x180 [ 2803.624091][T10883] ? syscall_enter_from_user_mode+0x26/0x80 [ 2803.630120][T10883] do_syscall_64+0x3f/0x110 [ 2803.634656][T10883] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2803.640589][T10883] RIP: 0033:0x7f6554c7cae9 [ 2803.645030][T10883] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2803.664667][T10883] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2803.673114][T10883] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2803.681117][T10883] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2803.689119][T10883] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2803.697119][T10883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2803.705118][T10883] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2803.713164][T10883] [ 2803.788818][T10883] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0xa00, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) [ 2803.855571][T10894] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2803.929100][T10928] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2803.947076][T10928] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2803.957518][T10928] CPU: 0 PID: 10928 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2803.967902][T10928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2803.977958][T10928] Call Trace: [ 2803.981232][T10928] [ 2803.984163][T10928] dump_stack_lvl+0x125/0x1b0 [ 2803.988843][T10928] sysfs_warn_dup+0x7f/0xa0 [ 2803.993344][T10928] sysfs_create_dir_ns+0x247/0x2a0 [ 2803.998444][T10928] ? sysfs_create_mount_point+0xb0/0xb0 [ 2804.003984][T10928] ? spin_bug+0x1d0/0x1d0 [ 2804.008316][T10928] ? net_namespace+0x12/0x40 [ 2804.012902][T10928] ? device_namespace+0x8d/0xc0 [ 2804.017753][T10928] kobject_add_internal+0x2c8/0x960 [ 2804.022952][T10928] kobject_add+0x16f/0x240 [ 2804.027395][T10928] ? kset_create_and_add+0x190/0x190 [ 2804.032677][T10928] ? do_raw_spin_unlock+0x173/0x230 [ 2804.037873][T10928] ? kobject_put+0xbe/0x440 [ 2804.042383][T10928] device_add+0x289/0x1aa0 [ 2804.046798][T10928] ? device_initialize+0x510/0x510 [ 2804.051925][T10928] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2804.058786][T10928] ? __init_waitqueue_head+0xca/0x150 [ 2804.064177][T10928] netdev_register_kobject+0x183/0x3f0 [ 2804.069647][T10928] register_netdevice+0xbdf/0x14a0 [ 2804.074765][T10928] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2804.080666][T10928] veth_newlink+0x4ef/0xa00 [ 2804.085191][T10928] ? veth_set_features+0x2d0/0x2d0 [ 2804.090313][T10928] ? rtnl_create_link+0xc9c/0xfd0 [ 2804.095348][T10928] ? __rtnl_newlink+0x108a/0x1930 [ 2804.100382][T10928] ? rtnl_newlink+0x67/0xa0 [ 2804.104942][T10928] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2804.110186][T10928] ? alloc_netdev_mqs+0xee6/0x1290 [ 2804.115488][T10928] ? rtnl_create_link+0xa6d/0xfd0 [ 2804.120527][T10928] ? veth_set_features+0x2d0/0x2d0 [ 2804.125643][T10928] __rtnl_newlink+0x1173/0x1930 [ 2804.130519][T10928] ? rtnl_link_unregister+0x260/0x260 [ 2804.135933][T10928] rtnl_newlink+0x67/0xa0 [ 2804.140281][T10928] ? __rtnl_newlink+0x1930/0x1930 [ 2804.145318][T10928] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2804.150287][T10928] ? rtnl_getlink+0xb40/0xb40 [ 2804.154992][T10928] netlink_rcv_skb+0x16b/0x440 [ 2804.159760][T10928] ? rtnl_getlink+0xb40/0xb40 [ 2804.164458][T10928] ? netlink_ack+0x1370/0x1370 [ 2804.169242][T10928] ? netlink_deliver_tap+0x1a0/0xd00 [ 2804.174535][T10928] netlink_unicast+0x53b/0x810 [ 2804.179320][T10928] ? netlink_attachskb+0x880/0x880 [ 2804.184444][T10928] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2804.190346][T10928] ? __phys_addr_symbol+0x30/0x70 [ 2804.195384][T10928] ? __check_object_size+0x323/0x730 [ 2804.200773][T10928] netlink_sendmsg+0x93c/0xe40 [ 2804.205641][T10928] ? netlink_unicast+0x810/0x810 [ 2804.210591][T10928] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2804.215879][T10928] ? netlink_unicast+0x810/0x810 [ 2804.220822][T10928] __sock_sendmsg+0xd5/0x180 [ 2804.225428][T10928] ____sys_sendmsg+0x6ac/0x940 [ 2804.230202][T10928] ? copy_msghdr_from_user+0x10b/0x160 [ 2804.235664][T10928] ? kernel_sendmsg+0x50/0x50 [ 2804.240359][T10928] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2804.246365][T10928] ___sys_sendmsg+0x135/0x1d0 [ 2804.251052][T10928] ? do_recvmmsg+0x740/0x740 [ 2804.255650][T10928] ? find_held_lock+0x2d/0x110 [ 2804.260449][T10928] ? __fget_light+0xe6/0x260 [ 2804.265054][T10928] __sys_sendmsg+0x117/0x1e0 [ 2804.269647][T10928] ? __sys_sendmsg_sock+0x30/0x30 [ 2804.274671][T10928] ? xfd_validate_state+0x5d/0x180 [ 2804.279816][T10928] ? syscall_enter_from_user_mode+0x26/0x80 [ 2804.285725][T10928] do_syscall_64+0x3f/0x110 [ 2804.290237][T10928] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2804.296146][T10928] RIP: 0033:0x7f6554c7cae9 [ 2804.300561][T10928] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2804.320181][T10928] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2804.328615][T10928] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2804.336588][T10928] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2804.344560][T10928] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2804.352540][T10928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2804.360515][T10928] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2804.368503][T10928] 20:50:25 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x68, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:25 executing program 0: memfd_create(&(0x7f00000001c0)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5y\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x00\x00\x00\x00\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\xa4\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x81\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z#:\x03\xce\xfe\x02\xe0\xad\xa2\t\xedI\xbc\xa2\xc8\x0e\x15\x19\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xefKlb\xe5:\x00\xfe\xff\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2nR\x00Q\x87\xa5\nM6.\xfa\xb2\xc9\xd0q\xb6\x8b\xa7-\xf4\xbc\x1e\xb10\xdf\x8b\xf6*=`xC\xbb\xcf.\xf4\xb2\x82\xb6\xca\xe7\xc0\xd4j\xa7/)\xb1\xf45\xc8/>\xffo0\xb4\xc7C!\xfb\xaf\x01\xaa\xf8\xf6\fGR\r\xd0\xd4\xc0\xcd_\xe6Z \xde4\xea\xb8\xddy\xd0\x1b\xf4\x83\xaa\xe7\xc0\xb6\xd7\x9b2\xd9\x9d\x15\xa1\xa8\xdc\x1b\xd0U<[\x01\x1e\x93\xe8\xbd\x9d?\x85{\xf9\xae\x10\xa5\xdc\xd5\xa4\xf0\x93\xb4\x93\xb9\xd5m\x9a\xa0\xf01\xf1\xc0\x17F\xd5\xca`\xbe\x1b\x91Fg\x99R\x82\x13D\x9f\xa0C1KHf\xe8', 0x2) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xf, 0x110, 0xffffffffffffffff, 0xa8eb7000) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x800) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000540)=""/226, 0xe2) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000640)="e013a0ff46145d7a798d993b5c4425abc917cdbd7a433506798459ed57abf32fc5fa685dc65255cab4c9314dd6125664e3798a7e86d641030e201cad2c0b8a9e1627e954ed2ac44a5130a3ad563646216dc6d8b2", 0x54}], 0x1, 0x1, 0x80) process_vm_writev(r0, &(0x7f0000000b80), 0x0, &(0x7f0000000140)=[{&(0x7f0000000c40)=""/138, 0x8a}, {&(0x7f0000000000)=""/46, 0x2e}, {&(0x7f0000000040)=""/223, 0xdf}], 0x3, 0x0) 20:50:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89ffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:25 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x3fb, 0x800, 0x70bd2a, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000885}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) [ 2804.385042][T10928] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2804.417054][T10929] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0xb00, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:25 executing program 0: memfd_create(&(0x7f00000001c0)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5y\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x00\x00\x00\x00\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\xa4\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x81\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z#:\x03\xce\xfe\x02\xe0\xad\xa2\t\xedI\xbc\xa2\xc8\x0e\x15\x19\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xefKlb\xe5:\x00\xfe\xff\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2nR\x00Q\x87\xa5\nM6.\xfa\xb2\xc9\xd0q\xb6\x8b\xa7-\xf4\xbc\x1e\xb10\xdf\x8b\xf6*=`xC\xbb\xcf.\xf4\xb2\x82\xb6\xca\xe7\xc0\xd4j\xa7/)\xb1\xf45\xc8/>\xffo0\xb4\xc7C!\xfb\xaf\x01\xaa\xf8\xf6\fGR\r\xd0\xd4\xc0\xcd_\xe6Z \xde4\xea\xb8\xddy\xd0\x1b\xf4\x83\xaa\xe7\xc0\xb6\xd7\x9b2\xd9\x9d\x15\xa1\xa8\xdc\x1b\xd0U<[\x01\x1e\x93\xe8\xbd\x9d?\x85{\xf9\xae\x10\xa5\xdc\xd5\xa4\xf0\x93\xb4\x93\xb9\xd5m\x9a\xa0\xf01\xf1\xc0\x17F\xd5\xca`\xbe\x1b\x91Fg\x99R\x82\x13D\x9f\xa0C1KHf\xe8', 0x2) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xf, 0x110, 0xffffffffffffffff, 0xa8eb7000) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x800) (async) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000540)=""/226, 0xe2) (async) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000640)="e013a0ff46145d7a798d993b5c4425abc917cdbd7a433506798459ed57abf32fc5fa685dc65255cab4c9314dd6125664e3798a7e86d641030e201cad2c0b8a9e1627e954ed2ac44a5130a3ad563646216dc6d8b2", 0x54}], 0x1, 0x1, 0x80) (async) process_vm_writev(r0, &(0x7f0000000b80), 0x0, &(0x7f0000000140)=[{&(0x7f0000000c40)=""/138, 0x8a}, {&(0x7f0000000000)=""/46, 0x2e}, {&(0x7f0000000040)=""/223, 0xdf}], 0x3, 0x0) 20:50:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x6c, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8bffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:25 executing program 0: memfd_create(&(0x7f00000001c0)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5y\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x00\x00\x00\x00\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\xa4\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x81\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z#:\x03\xce\xfe\x02\xe0\xad\xa2\t\xedI\xbc\xa2\xc8\x0e\x15\x19\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xefKlb\xe5:\x00\xfe\xff\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2nR\x00Q\x87\xa5\nM6.\xfa\xb2\xc9\xd0q\xb6\x8b\xa7-\xf4\xbc\x1e\xb10\xdf\x8b\xf6*=`xC\xbb\xcf.\xf4\xb2\x82\xb6\xca\xe7\xc0\xd4j\xa7/)\xb1\xf45\xc8/>\xffo0\xb4\xc7C!\xfb\xaf\x01\xaa\xf8\xf6\fGR\r\xd0\xd4\xc0\xcd_\xe6Z \xde4\xea\xb8\xddy\xd0\x1b\xf4\x83\xaa\xe7\xc0\xb6\xd7\x9b2\xd9\x9d\x15\xa1\xa8\xdc\x1b\xd0U<[\x01\x1e\x93\xe8\xbd\x9d?\x85{\xf9\xae\x10\xa5\xdc\xd5\xa4\xf0\x93\xb4\x93\xb9\xd5m\x9a\xa0\xf01\xf1\xc0\x17F\xd5\xca`\xbe\x1b\x91Fg\x99R\x82\x13D\x9f\xa0C1KHf\xe8', 0x2) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xf, 0x110, 0xffffffffffffffff, 0xa8eb7000) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x800) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000540)=""/226, 0xe2) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000640)="e013a0ff46145d7a798d993b5c4425abc917cdbd7a433506798459ed57abf32fc5fa685dc65255cab4c9314dd6125664e3798a7e86d641030e201cad2c0b8a9e1627e954ed2ac44a5130a3ad563646216dc6d8b2", 0x54}], 0x1, 0x1, 0x80) process_vm_writev(r0, &(0x7f0000000b80), 0x0, &(0x7f0000000140)=[{&(0x7f0000000c40)=""/138, 0x8a}, {&(0x7f0000000000)=""/46, 0x2e}, {&(0x7f0000000040)=""/223, 0xdf}], 0x3, 0x0) memfd_create(&(0x7f00000001c0)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5y\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x00\x00\x00\x00\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\xa4\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x81\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z#:\x03\xce\xfe\x02\xe0\xad\xa2\t\xedI\xbc\xa2\xc8\x0e\x15\x19\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xefKlb\xe5:\x00\xfe\xff\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2nR\x00Q\x87\xa5\nM6.\xfa\xb2\xc9\xd0q\xb6\x8b\xa7-\xf4\xbc\x1e\xb10\xdf\x8b\xf6*=`xC\xbb\xcf.\xf4\xb2\x82\xb6\xca\xe7\xc0\xd4j\xa7/)\xb1\xf45\xc8/>\xffo0\xb4\xc7C!\xfb\xaf\x01\xaa\xf8\xf6\fGR\r\xd0\xd4\xc0\xcd_\xe6Z \xde4\xea\xb8\xddy\xd0\x1b\xf4\x83\xaa\xe7\xc0\xb6\xd7\x9b2\xd9\x9d\x15\xa1\xa8\xdc\x1b\xd0U<[\x01\x1e\x93\xe8\xbd\x9d?\x85{\xf9\xae\x10\xa5\xdc\xd5\xa4\xf0\x93\xb4\x93\xb9\xd5m\x9a\xa0\xf01\xf1\xc0\x17F\xd5\xca`\xbe\x1b\x91Fg\x99R\x82\x13D\x9f\xa0C1KHf\xe8', 0x2) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xf, 0x110, 0xffffffffffffffff, 0xa8eb7000) (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x800) (async) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000540)=""/226, 0xe2) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000640)="e013a0ff46145d7a798d993b5c4425abc917cdbd7a433506798459ed57abf32fc5fa685dc65255cab4c9314dd6125664e3798a7e86d641030e201cad2c0b8a9e1627e954ed2ac44a5130a3ad563646216dc6d8b2", 0x54}], 0x1, 0x1, 0x80) (async) process_vm_writev(r0, &(0x7f0000000b80), 0x0, &(0x7f0000000140)=[{&(0x7f0000000c40)=""/138, 0x8a}, {&(0x7f0000000000)=""/46, 0x2e}, {&(0x7f0000000040)=""/223, 0xdf}], 0x3, 0x0) (async) [ 2804.641745][T10947] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x74, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2804.711624][T10947] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2804.748712][T10947] CPU: 1 PID: 10947 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2804.758835][T10947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2804.768914][T10947] Call Trace: [ 2804.772212][T10947] [ 2804.775172][T10947] dump_stack_lvl+0x125/0x1b0 [ 2804.779907][T10947] sysfs_warn_dup+0x7f/0xa0 [ 2804.784456][T10947] sysfs_create_dir_ns+0x247/0x2a0 [ 2804.789599][T10947] ? sysfs_create_mount_point+0xb0/0xb0 [ 2804.795177][T10947] ? spin_bug+0x1d0/0x1d0 [ 2804.799552][T10947] ? net_namespace+0x12/0x40 [ 2804.804188][T10947] ? device_namespace+0x8d/0xc0 20:50:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x7a, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2804.809084][T10947] kobject_add_internal+0x2c8/0x960 [ 2804.814326][T10947] kobject_add+0x16f/0x240 [ 2804.818777][T10947] ? kset_create_and_add+0x190/0x190 [ 2804.824103][T10947] ? do_raw_spin_unlock+0x173/0x230 [ 2804.829343][T10947] ? kobject_put+0xbe/0x440 [ 2804.833895][T10947] device_add+0x289/0x1aa0 [ 2804.838345][T10947] ? device_initialize+0x510/0x510 [ 2804.843494][T10947] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2804.850399][T10947] ? __init_waitqueue_head+0xca/0x150 [ 2804.855821][T10947] netdev_register_kobject+0x183/0x3f0 [ 2804.861313][T10947] register_netdevice+0xbdf/0x14a0 [ 2804.866436][T10947] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2804.872343][T10947] veth_newlink+0x4ef/0xa00 [ 2804.876858][T10947] ? veth_set_features+0x2d0/0x2d0 [ 2804.881976][T10947] ? rtnl_create_link+0xc9c/0xfd0 [ 2804.887017][T10947] ? __rtnl_newlink+0x108a/0x1930 [ 2804.892056][T10947] ? rtnl_newlink+0x67/0xa0 [ 2804.896619][T10947] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2804.901836][T10947] ? alloc_netdev_mqs+0xee6/0x1290 [ 2804.906971][T10947] ? rtnl_create_link+0xa6d/0xfd0 [ 2804.912010][T10947] ? veth_set_features+0x2d0/0x2d0 [ 2804.917314][T10947] __rtnl_newlink+0x1173/0x1930 [ 2804.922189][T10947] ? rtnl_link_unregister+0x260/0x260 [ 2804.927604][T10947] rtnl_newlink+0x67/0xa0 [ 2804.931945][T10947] ? __rtnl_newlink+0x1930/0x1930 [ 2804.936981][T10947] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2804.941934][T10947] ? rtnl_getlink+0xb40/0xb40 [ 2804.946637][T10947] netlink_rcv_skb+0x16b/0x440 [ 2804.951408][T10947] ? rtnl_getlink+0xb40/0xb40 [ 2804.956097][T10947] ? netlink_ack+0x1370/0x1370 [ 2804.960877][T10947] ? netlink_deliver_tap+0x1a0/0xd00 [ 2804.966172][T10947] netlink_unicast+0x53b/0x810 [ 2804.970944][T10947] ? netlink_attachskb+0x880/0x880 [ 2804.976060][T10947] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2804.981962][T10947] ? __phys_addr_symbol+0x30/0x70 [ 2804.986996][T10947] ? __check_object_size+0x323/0x730 [ 2804.992303][T10947] netlink_sendmsg+0x93c/0xe40 [ 2804.997078][T10947] ? netlink_unicast+0x810/0x810 [ 2805.002028][T10947] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2805.007324][T10947] ? netlink_unicast+0x810/0x810 [ 2805.012271][T10947] __sock_sendmsg+0xd5/0x180 [ 2805.016902][T10947] ____sys_sendmsg+0x6ac/0x940 [ 2805.021681][T10947] ? copy_msghdr_from_user+0x10b/0x160 [ 2805.027144][T10947] ? kernel_sendmsg+0x50/0x50 [ 2805.031858][T10947] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2805.037868][T10947] ___sys_sendmsg+0x135/0x1d0 [ 2805.042564][T10947] ? do_recvmmsg+0x740/0x740 [ 2805.047165][T10947] ? find_held_lock+0x2d/0x110 [ 2805.051972][T10947] ? __fget_light+0xe6/0x260 [ 2805.056584][T10947] __sys_sendmsg+0x117/0x1e0 [ 2805.061187][T10947] ? __sys_sendmsg_sock+0x30/0x30 [ 2805.066219][T10947] ? xfd_validate_state+0x5d/0x180 [ 2805.071368][T10947] ? syscall_enter_from_user_mode+0x26/0x80 [ 2805.077282][T10947] do_syscall_64+0x3f/0x110 [ 2805.081822][T10947] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2805.087733][T10947] RIP: 0033:0x7f6554c7cae9 [ 2805.092246][T10947] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2805.111953][T10947] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2805.120381][T10947] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2805.128359][T10947] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2805.136337][T10947] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2805.144312][T10947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2805.152283][T10947] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2805.160273][T10947] [ 2805.169171][T10947] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:26 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16c, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:26 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f00000000c0)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r2, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000000)="6567360f79aa6565ffff0f01c30fc72a440f35f3450fc77100476690650f6e146066baa100b839000000eff265d9f536440f01f9", 0x34}], 0x1, 0x9, &(0x7f0000000080)=[@efer={0x2, 0x900}, @cr0={0x0, 0xa0000000}], 0x2) 20:50:26 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 32) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) (async, rerun: 32) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x3fb, 0x800, 0x70bd2a, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000885}, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) (async, rerun: 64) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (rerun: 64) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:50:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x300, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0xc00, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x500, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:26 executing program 2: pipe(&(0x7f0000000140)) (async) socket$netlink(0x10, 0x3, 0x0) (async, rerun: 64) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async, rerun: 64) socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async, rerun: 32) socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 32) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x3fb, 0x800, 0x70bd2a, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000885}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) (async) sendfile(r3, r2, 0x0, 0x100000002) [ 2805.558406][T10979] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2805.581472][T10979] CPU: 0 PID: 10979 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2805.591604][T10979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2805.601686][T10979] Call Trace: [ 2805.604983][T10979] 20:50:26 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f00000000c0)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r2, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000000)="6567360f79aa6565ffff0f01c30fc72a440f35f3450fc77100476690650f6e146066baa100b839000000eff265d9f536440f01f9", 0x34}], 0x1, 0x9, &(0x7f0000000080)=[@efer={0x2, 0x900}, @cr0={0x0, 0xa0000000}], 0x2) [ 2805.607930][T10979] dump_stack_lvl+0x125/0x1b0 [ 2805.612642][T10979] sysfs_warn_dup+0x7f/0xa0 [ 2805.617187][T10979] sysfs_create_dir_ns+0x247/0x2a0 [ 2805.622327][T10979] ? sysfs_create_mount_point+0xb0/0xb0 [ 2805.627902][T10979] ? spin_bug+0x1d0/0x1d0 [ 2805.632273][T10979] ? net_namespace+0x12/0x40 [ 2805.636899][T10979] ? device_namespace+0x8d/0xc0 [ 2805.641787][T10979] kobject_add_internal+0x2c8/0x960 [ 2805.647035][T10979] kobject_add+0x16f/0x240 [ 2805.651488][T10979] ? kset_create_and_add+0x190/0x190 [ 2805.656814][T10979] ? do_raw_spin_unlock+0x173/0x230 [ 2805.662062][T10979] ? kobject_put+0xbe/0x440 [ 2805.666615][T10979] device_add+0x289/0x1aa0 [ 2805.671066][T10979] ? device_initialize+0x510/0x510 [ 2805.676231][T10979] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2805.683117][T10979] ? __init_waitqueue_head+0xca/0x150 [ 2805.688537][T10979] netdev_register_kobject+0x183/0x3f0 [ 2805.694042][T10979] register_netdevice+0xbdf/0x14a0 [ 2805.699189][T10979] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2805.705123][T10979] veth_newlink+0x4ef/0xa00 [ 2805.709658][T10979] ? veth_set_features+0x2d0/0x2d0 [ 2805.714808][T10979] ? rtnl_create_link+0xc9c/0xfd0 [ 2805.719872][T10979] ? __rtnl_newlink+0x108a/0x1930 [ 2805.724933][T10979] ? rtnl_newlink+0x67/0xa0 [ 2805.729528][T10979] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2805.734765][T10979] ? alloc_netdev_mqs+0xee6/0x1290 [ 2805.739926][T10979] ? rtnl_create_link+0xa6d/0xfd0 [ 2805.744996][T10979] ? veth_set_features+0x2d0/0x2d0 [ 2805.750139][T10979] __rtnl_newlink+0x1173/0x1930 20:50:26 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) [ 2805.755106][T10979] ? rtnl_link_unregister+0x260/0x260 [ 2805.760555][T10979] rtnl_newlink+0x67/0xa0 [ 2805.764923][T10979] ? __rtnl_newlink+0x1930/0x1930 [ 2805.769985][T10979] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2805.775064][T10979] ? rtnl_getlink+0xb40/0xb40 [ 2805.779798][T10979] netlink_rcv_skb+0x16b/0x440 [ 2805.784596][T10979] ? rtnl_getlink+0xb40/0xb40 [ 2805.789312][T10979] ? netlink_ack+0x1370/0x1370 [ 2805.794122][T10979] ? netlink_deliver_tap+0x1a0/0xd00 [ 2805.799448][T10979] netlink_unicast+0x53b/0x810 [ 2805.804246][T10979] ? netlink_attachskb+0x880/0x880 [ 2805.809389][T10979] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2805.815317][T10979] ? __phys_addr_symbol+0x30/0x70 [ 2805.820377][T10979] ? __check_object_size+0x323/0x730 [ 2805.825707][T10979] netlink_sendmsg+0x93c/0xe40 [ 2805.830502][T10979] ? netlink_unicast+0x810/0x810 [ 2805.835473][T10979] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2805.840789][T10979] ? netlink_unicast+0x810/0x810 [ 2805.845765][T10979] __sock_sendmsg+0xd5/0x180 [ 2805.850398][T10979] ____sys_sendmsg+0x6ac/0x940 [ 2805.855199][T10979] ? copy_msghdr_from_user+0x10b/0x160 [ 2805.860683][T10979] ? kernel_sendmsg+0x50/0x50 [ 2805.865406][T10979] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2805.871438][T10979] ___sys_sendmsg+0x135/0x1d0 [ 2805.876151][T10979] ? do_recvmmsg+0x740/0x740 [ 2805.880767][T10979] ? find_held_lock+0x2d/0x110 [ 2805.885601][T10979] ? __fget_light+0xe6/0x260 [ 2805.890231][T10979] __sys_sendmsg+0x117/0x1e0 [ 2805.894853][T10979] ? __sys_sendmsg_sock+0x30/0x30 [ 2805.899902][T10979] ? xfd_validate_state+0x5d/0x180 20:50:26 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f00000000c0)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r2, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000000)="6567360f79aa6565ffff0f01c30fc72a440f35f3450fc77100476690650f6e146066baa100b839000000eff265d9f536440f01f9", 0x34}], 0x1, 0x9, &(0x7f0000000080)=[@efer={0x2, 0x900}, @cr0={0x0, 0xa0000000}], 0x2) memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f00000000c0)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) openat(r2, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000000)="6567360f79aa6565ffff0f01c30fc72a440f35f3450fc77100476690650f6e146066baa100b839000000eff265d9f536440f01f9", 0x34}], 0x1, 0x9, &(0x7f0000000080)=[@efer={0x2, 0x900}, @cr0={0x0, 0xa0000000}], 0x2) (async) [ 2805.905072][T10979] ? syscall_enter_from_user_mode+0x26/0x80 [ 2805.911006][T10979] do_syscall_64+0x3f/0x110 [ 2805.915545][T10979] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2805.921478][T10979] RIP: 0033:0x7f6554c7cae9 [ 2805.925916][T10979] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2805.945558][T10979] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:50:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x600, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2805.954006][T10979] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2805.962003][T10979] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2805.970004][T10979] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2805.978001][T10979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2805.985997][T10979] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2805.994014][T10979] [ 2806.160311][T10979] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2806.265618][T11009] __nla_validate_parse: 2 callbacks suppressed [ 2806.265638][T11009] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:27 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x700, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:27 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000600)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) recvmmsg(r2, &(0x7f0000000800)=[{{&(0x7f0000000640)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)=""/95, 0x5f}, {&(0x7f0000000740)=""/38, 0x26}], 0x2, &(0x7f00000007c0)}, 0x7}], 0x1, 0x40000000, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/227, 0xe3}, {&(0x7f0000000100)=""/130, 0x82}, {&(0x7f0000000540)=""/138, 0x8a}], 0x3, 0x80000000, 0x7d) 20:50:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0xe00, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:27 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x4800, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2806.461090][T11020] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:27 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000600)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) recvmmsg(r2, &(0x7f0000000800)=[{{&(0x7f0000000640)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)=""/95, 0x5f}, {&(0x7f0000000740)=""/38, 0x26}], 0x2, &(0x7f00000007c0)}, 0x7}], 0x1, 0x40000000, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/227, 0xe3}, {&(0x7f0000000100)=""/130, 0x82}, {&(0x7f0000000540)=""/138, 0x8a}], 0x3, 0x80000000, 0x7d) [ 2806.528967][T11020] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2806.562005][T11020] CPU: 0 PID: 11020 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2806.572127][T11020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2806.582208][T11020] Call Trace: [ 2806.585506][T11020] [ 2806.588456][T11020] dump_stack_lvl+0x125/0x1b0 [ 2806.593174][T11020] sysfs_warn_dup+0x7f/0xa0 [ 2806.597719][T11020] sysfs_create_dir_ns+0x247/0x2a0 [ 2806.602865][T11020] ? sysfs_create_mount_point+0xb0/0xb0 [ 2806.608444][T11020] ? spin_bug+0x1d0/0x1d0 [ 2806.612812][T11020] ? net_namespace+0x12/0x40 [ 2806.617435][T11020] ? device_namespace+0x8d/0xc0 [ 2806.622322][T11020] kobject_add_internal+0x2c8/0x960 [ 2806.627561][T11020] kobject_add+0x16f/0x240 [ 2806.632015][T11020] ? kset_create_and_add+0x190/0x190 [ 2806.637339][T11020] ? do_raw_spin_unlock+0x173/0x230 [ 2806.642580][T11020] ? kobject_put+0xbe/0x440 [ 2806.647128][T11020] device_add+0x289/0x1aa0 [ 2806.651578][T11020] ? device_initialize+0x510/0x510 [ 2806.656726][T11020] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2806.663698][T11020] ? __init_waitqueue_head+0xca/0x150 [ 2806.669103][T11020] netdev_register_kobject+0x183/0x3f0 [ 2806.674582][T11020] register_netdevice+0xbdf/0x14a0 [ 2806.679698][T11020] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2806.685609][T11020] veth_newlink+0x4ef/0xa00 [ 2806.690133][T11020] ? veth_set_features+0x2d0/0x2d0 [ 2806.695247][T11020] ? rtnl_create_link+0xc9c/0xfd0 [ 2806.700281][T11020] ? __rtnl_newlink+0x108a/0x1930 [ 2806.705316][T11020] ? rtnl_newlink+0x67/0xa0 [ 2806.709874][T11020] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2806.715081][T11020] ? alloc_netdev_mqs+0xee6/0x1290 [ 2806.720208][T11020] ? rtnl_create_link+0xa6d/0xfd0 [ 2806.725245][T11020] ? veth_set_features+0x2d0/0x2d0 [ 2806.730360][T11020] __rtnl_newlink+0x1173/0x1930 [ 2806.735236][T11020] ? rtnl_link_unregister+0x260/0x260 [ 2806.740647][T11020] rtnl_newlink+0x67/0xa0 [ 2806.744989][T11020] ? __rtnl_newlink+0x1930/0x1930 [ 2806.750026][T11020] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2806.754980][T11020] ? rtnl_getlink+0xb40/0xb40 [ 2806.759683][T11020] netlink_rcv_skb+0x16b/0x440 [ 2806.764452][T11020] ? rtnl_getlink+0xb40/0xb40 [ 2806.769145][T11020] ? netlink_ack+0x1370/0x1370 [ 2806.773928][T11020] ? netlink_deliver_tap+0x1a0/0xd00 [ 2806.779224][T11020] netlink_unicast+0x53b/0x810 [ 2806.783997][T11020] ? netlink_attachskb+0x880/0x880 [ 2806.789132][T11020] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2806.795035][T11020] ? __phys_addr_symbol+0x30/0x70 [ 2806.800066][T11020] ? __check_object_size+0x323/0x730 [ 2806.805376][T11020] netlink_sendmsg+0x93c/0xe40 [ 2806.810158][T11020] ? netlink_unicast+0x810/0x810 [ 2806.815105][T11020] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2806.820576][T11020] ? netlink_unicast+0x810/0x810 [ 2806.825524][T11020] __sock_sendmsg+0xd5/0x180 [ 2806.830132][T11020] ____sys_sendmsg+0x6ac/0x940 [ 2806.834909][T11020] ? copy_msghdr_from_user+0x10b/0x160 [ 2806.840373][T11020] ? kernel_sendmsg+0x50/0x50 [ 2806.845068][T11020] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2806.851069][T11020] ___sys_sendmsg+0x135/0x1d0 [ 2806.855757][T11020] ? do_recvmmsg+0x740/0x740 [ 2806.860352][T11020] ? find_held_lock+0x2d/0x110 [ 2806.865153][T11020] ? __fget_light+0xe6/0x260 [ 2806.869763][T11020] __sys_sendmsg+0x117/0x1e0 [ 2806.874358][T11020] ? __sys_sendmsg_sock+0x30/0x30 [ 2806.879383][T11020] ? xfd_validate_state+0x5d/0x180 [ 2806.884521][T11020] ? syscall_enter_from_user_mode+0x26/0x80 [ 2806.890435][T11020] do_syscall_64+0x3f/0x110 [ 2806.894947][T11020] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2806.900851][T11020] RIP: 0033:0x7f6554c7cae9 [ 2806.905271][T11020] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2806.924889][T11020] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2806.933305][T11020] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2806.941276][T11020] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2806.949249][T11020] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2806.957233][T11020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2806.965211][T11020] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2806.973216][T11020] [ 2806.980177][T11020] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:27 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x4c00, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:27 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) (async) r1 = socket$rxrpc(0x21, 0x2, 0xa) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) (async) sendfile(r3, r2, 0x0, 0x100000002) 20:50:27 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x6800, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:27 executing program 0: memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) (async) r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000600)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) recvmmsg(r2, &(0x7f0000000800)=[{{&(0x7f0000000640)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)=""/95, 0x5f}, {&(0x7f0000000740)=""/38, 0x26}], 0x2, &(0x7f00000007c0)}, 0x7}], 0x1, 0x40000000, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/227, 0xe3}, {&(0x7f0000000100)=""/130, 0x82}, {&(0x7f0000000540)=""/138, 0x8a}], 0x3, 0x80000000, 0x7d) [ 2807.097673][T11033] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:27 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x6c00, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a2, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0xf00, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:27 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x7400, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:27 executing program 2: pipe(&(0x7f0000000140)) (async, rerun: 32) socket$netlink(0x10, 0x3, 0x0) (rerun: 32) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) (async, rerun: 32) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 32) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) [ 2807.336672][T11055] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:27 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x7a00, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:27 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 2807.381179][T11055] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2807.445730][T11055] CPU: 0 PID: 11055 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2807.455857][T11055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2807.465921][T11055] Call Trace: [ 2807.469200][T11055] [ 2807.472132][T11055] dump_stack_lvl+0x125/0x1b0 [ 2807.476826][T11055] sysfs_warn_dup+0x7f/0xa0 [ 2807.481348][T11055] sysfs_create_dir_ns+0x247/0x2a0 [ 2807.486465][T11055] ? sysfs_create_mount_point+0xb0/0xb0 [ 2807.492012][T11055] ? spin_bug+0x1d0/0x1d0 [ 2807.496359][T11055] ? net_namespace+0x12/0x40 [ 2807.500963][T11055] ? device_namespace+0x8d/0xc0 [ 2807.505827][T11055] kobject_add_internal+0x2c8/0x960 [ 2807.511044][T11055] kobject_add+0x16f/0x240 [ 2807.515477][T11055] ? kset_create_and_add+0x190/0x190 [ 2807.520772][T11055] ? do_raw_spin_unlock+0x173/0x230 [ 2807.525985][T11055] ? kobject_put+0xbe/0x440 [ 2807.530507][T11055] device_add+0x289/0x1aa0 [ 2807.534928][T11055] ? device_initialize+0x510/0x510 [ 2807.540052][T11055] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2807.546916][T11055] ? __init_waitqueue_head+0xca/0x150 [ 2807.552303][T11055] netdev_register_kobject+0x183/0x3f0 [ 2807.557771][T11055] register_netdevice+0xbdf/0x14a0 [ 2807.562895][T11055] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2807.568812][T11055] veth_newlink+0x4ef/0xa00 [ 2807.573415][T11055] ? veth_set_features+0x2d0/0x2d0 [ 2807.578532][T11055] ? rtnl_create_link+0xc9c/0xfd0 [ 2807.583565][T11055] ? __rtnl_newlink+0x108a/0x1930 [ 2807.588604][T11055] ? rtnl_newlink+0x67/0xa0 [ 2807.593171][T11055] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2807.598385][T11055] ? alloc_netdev_mqs+0xee6/0x1290 [ 2807.603508][T11055] ? rtnl_create_link+0xa6d/0xfd0 [ 2807.608547][T11055] ? veth_set_features+0x2d0/0x2d0 [ 2807.613662][T11055] __rtnl_newlink+0x1173/0x1930 [ 2807.618538][T11055] ? rtnl_link_unregister+0x260/0x260 [ 2807.623952][T11055] rtnl_newlink+0x67/0xa0 [ 2807.628297][T11055] ? __rtnl_newlink+0x1930/0x1930 [ 2807.633345][T11055] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2807.638385][T11055] ? rtnl_getlink+0xb40/0xb40 [ 2807.643091][T11055] netlink_rcv_skb+0x16b/0x440 [ 2807.647860][T11055] ? rtnl_getlink+0xb40/0xb40 [ 2807.652552][T11055] ? netlink_ack+0x1370/0x1370 [ 2807.657334][T11055] ? netlink_deliver_tap+0x1a0/0xd00 [ 2807.662718][T11055] netlink_unicast+0x53b/0x810 [ 2807.667526][T11055] ? netlink_attachskb+0x880/0x880 [ 2807.672641][T11055] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2807.678543][T11055] ? __phys_addr_symbol+0x30/0x70 [ 2807.683583][T11055] ? __check_object_size+0x323/0x730 [ 2807.688900][T11055] netlink_sendmsg+0x93c/0xe40 [ 2807.693677][T11055] ? netlink_unicast+0x810/0x810 [ 2807.698624][T11055] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2807.704176][T11055] ? netlink_unicast+0x810/0x810 [ 2807.709119][T11055] __sock_sendmsg+0xd5/0x180 [ 2807.713723][T11055] ____sys_sendmsg+0x6ac/0x940 [ 2807.718501][T11055] ? copy_msghdr_from_user+0x10b/0x160 [ 2807.723962][T11055] ? kernel_sendmsg+0x50/0x50 [ 2807.728658][T11055] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2807.734658][T11055] ___sys_sendmsg+0x135/0x1d0 [ 2807.739342][T11055] ? do_recvmmsg+0x740/0x740 [ 2807.743935][T11055] ? find_held_lock+0x2d/0x110 [ 2807.748731][T11055] ? __fget_light+0xe6/0x260 [ 2807.753335][T11055] __sys_sendmsg+0x117/0x1e0 [ 2807.757945][T11055] ? __sys_sendmsg_sock+0x30/0x30 [ 2807.762968][T11055] ? xfd_validate_state+0x5d/0x180 [ 2807.768109][T11055] ? syscall_enter_from_user_mode+0x26/0x80 [ 2807.774023][T11055] do_syscall_64+0x3f/0x110 [ 2807.778544][T11055] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2807.784465][T11055] RIP: 0033:0x7f6554c7cae9 [ 2807.788906][T11055] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2807.808531][T11055] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2807.816957][T11055] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2807.825016][T11055] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2807.832987][T11055] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2807.840961][T11055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2807.848932][T11055] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2807.856930][T11055] 20:50:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x40000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:28 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffffff, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000100)=0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'wlan0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=0x0, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r7, &(0x7f00000002c0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) fcntl$dupfd(r5, 0x406, r7) sendfile(r4, r3, 0x0, 0x100000002) [ 2807.887542][T11055] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x800000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:28 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 2808.025805][T11060] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x1100, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) [ 2808.212893][T11084] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:28 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x1000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:28 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 2808.258762][T11084] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2808.284246][T11084] CPU: 1 PID: 11084 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2808.294372][T11084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2808.304436][T11084] Call Trace: [ 2808.307720][T11084] [ 2808.310650][T11084] dump_stack_lvl+0x125/0x1b0 [ 2808.315343][T11084] sysfs_warn_dup+0x7f/0xa0 [ 2808.319865][T11084] sysfs_create_dir_ns+0x247/0x2a0 [ 2808.324977][T11084] ? sysfs_create_mount_point+0xb0/0xb0 [ 2808.330524][T11084] ? spin_bug+0x1d0/0x1d0 [ 2808.335303][T11084] ? net_namespace+0x12/0x40 [ 2808.339901][T11084] ? device_namespace+0x8d/0xc0 [ 2808.344765][T11084] kobject_add_internal+0x2c8/0x960 [ 2808.350009][T11084] kobject_add+0x16f/0x240 [ 2808.354433][T11084] ? kset_create_and_add+0x190/0x190 [ 2808.359751][T11084] ? do_raw_spin_unlock+0x173/0x230 [ 2808.364969][T11084] ? kobject_put+0xbe/0x440 [ 2808.369517][T11084] device_add+0x289/0x1aa0 [ 2808.373940][T11084] ? device_initialize+0x510/0x510 [ 2808.379062][T11084] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2808.385922][T11084] ? __init_waitqueue_head+0xca/0x150 [ 2808.391311][T11084] netdev_register_kobject+0x183/0x3f0 [ 2808.396780][T11084] register_netdevice+0xbdf/0x14a0 [ 2808.401899][T11084] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2808.407806][T11084] veth_newlink+0x4ef/0xa00 [ 2808.412317][T11084] ? veth_set_features+0x2d0/0x2d0 [ 2808.417429][T11084] ? rtnl_create_link+0xc9c/0xfd0 [ 2808.422466][T11084] ? __rtnl_newlink+0x108a/0x1930 [ 2808.427501][T11084] ? rtnl_newlink+0x67/0xa0 [ 2808.432062][T11084] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2808.437270][T11084] ? alloc_netdev_mqs+0xee6/0x1290 [ 2808.442482][T11084] ? rtnl_create_link+0xa6d/0xfd0 [ 2808.447521][T11084] ? veth_set_features+0x2d0/0x2d0 [ 2808.452636][T11084] __rtnl_newlink+0x1173/0x1930 [ 2808.457514][T11084] ? rtnl_link_unregister+0x260/0x260 [ 2808.462934][T11084] rtnl_newlink+0x67/0xa0 [ 2808.467279][T11084] ? __rtnl_newlink+0x1930/0x1930 [ 2808.472314][T11084] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2808.477267][T11084] ? rtnl_getlink+0xb40/0xb40 [ 2808.481975][T11084] netlink_rcv_skb+0x16b/0x440 [ 2808.486747][T11084] ? rtnl_getlink+0xb40/0xb40 [ 2808.491440][T11084] ? netlink_ack+0x1370/0x1370 [ 2808.496224][T11084] ? netlink_deliver_tap+0x1a0/0xd00 [ 2808.501517][T11084] netlink_unicast+0x53b/0x810 [ 2808.506291][T11084] ? netlink_attachskb+0x880/0x880 [ 2808.511402][T11084] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2808.517306][T11084] ? __phys_addr_symbol+0x30/0x70 [ 2808.522336][T11084] ? __check_object_size+0x323/0x730 [ 2808.527640][T11084] netlink_sendmsg+0x93c/0xe40 [ 2808.532422][T11084] ? netlink_unicast+0x810/0x810 [ 2808.537369][T11084] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2808.542661][T11084] ? netlink_unicast+0x810/0x810 [ 2808.547604][T11084] __sock_sendmsg+0xd5/0x180 [ 2808.552208][T11084] ____sys_sendmsg+0x6ac/0x940 [ 2808.556985][T11084] ? copy_msghdr_from_user+0x10b/0x160 [ 2808.562446][T11084] ? kernel_sendmsg+0x50/0x50 [ 2808.567140][T11084] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2808.573137][T11084] ___sys_sendmsg+0x135/0x1d0 [ 2808.577817][T11084] ? do_recvmmsg+0x740/0x740 [ 2808.582408][T11084] ? find_held_lock+0x2d/0x110 [ 2808.587224][T11084] ? __fget_light+0xe6/0x260 [ 2808.591834][T11084] __sys_sendmsg+0x117/0x1e0 [ 2808.596432][T11084] ? __sys_sendmsg_sock+0x30/0x30 [ 2808.601458][T11084] ? xfd_validate_state+0x5d/0x180 [ 2808.606596][T11084] ? syscall_enter_from_user_mode+0x26/0x80 [ 2808.612507][T11084] do_syscall_64+0x3f/0x110 [ 2808.617018][T11084] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2808.622921][T11084] RIP: 0033:0x7f6554c7cae9 [ 2808.627336][T11084] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2808.646947][T11084] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2808.655361][T11084] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2808.663332][T11084] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2808.671308][T11084] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2808.679279][T11084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2808.687256][T11084] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2808.695244][T11084] 20:50:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93ffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2808.704347][T11084] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x2000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:29 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000fc0)={0x2020}, 0x2020) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000000)=""/79, 0x50}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x10000018, 0x0) 20:50:29 executing program 2: pipe(&(0x7f0000000140)) (async) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) r0 = socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffffff, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000100)=0x4) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) (async) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'wlan0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}}) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=0x0, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r7, &(0x7f00000002c0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) (async) fcntl$dupfd(r5, 0x406, r7) (async) sendfile(r4, r3, 0x0, 0x100000002) [ 2808.796933][T11086] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x1400, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x3000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x4000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:29 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) (async) r0 = socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$rxrpc(0x21, 0x2, 0xa) (async) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffffff, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) openat(0xffffffffffffffff, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000100)=0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r6], 0x2c}}, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'wlan0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}}) (async) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'wlan0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=0x0, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=0x0, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r7, &(0x7f00000002c0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) fcntl$dupfd(r5, 0x406, r7) sendfile(r4, r3, 0x0, 0x100000002) 20:50:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0ffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2809.022681][T11110] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2809.126371][T11110] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2809.135702][T11110] CPU: 0 PID: 11110 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2809.145820][T11110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2809.155904][T11110] Call Trace: [ 2809.159205][T11110] [ 2809.162155][T11110] dump_stack_lvl+0x125/0x1b0 [ 2809.166876][T11110] sysfs_warn_dup+0x7f/0xa0 [ 2809.171422][T11110] sysfs_create_dir_ns+0x247/0x2a0 [ 2809.176573][T11110] ? sysfs_create_mount_point+0xb0/0xb0 [ 2809.182125][T11110] ? spin_bug+0x1d0/0x1d0 [ 2809.186488][T11110] ? net_namespace+0x12/0x40 [ 2809.191095][T11110] ? device_namespace+0x8d/0xc0 [ 2809.195960][T11110] kobject_add_internal+0x2c8/0x960 [ 2809.201185][T11110] kobject_add+0x16f/0x240 [ 2809.205622][T11110] ? kset_create_and_add+0x190/0x190 [ 2809.210924][T11110] ? do_raw_spin_unlock+0x173/0x230 [ 2809.216140][T11110] ? kobject_put+0xbe/0x440 [ 2809.220661][T11110] device_add+0x289/0x1aa0 [ 2809.225083][T11110] ? device_initialize+0x510/0x510 [ 2809.230204][T11110] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2809.237069][T11110] ? __init_waitqueue_head+0xca/0x150 [ 2809.242460][T11110] netdev_register_kobject+0x183/0x3f0 [ 2809.247933][T11110] register_netdevice+0xbdf/0x14a0 [ 2809.253054][T11110] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2809.258970][T11110] veth_newlink+0x4ef/0xa00 [ 2809.263490][T11110] ? veth_set_features+0x2d0/0x2d0 [ 2809.268703][T11110] ? rtnl_create_link+0xc9c/0xfd0 [ 2809.273740][T11110] ? __rtnl_newlink+0x108a/0x1930 [ 2809.278787][T11110] ? rtnl_newlink+0x67/0xa0 [ 2809.283363][T11110] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2809.288573][T11110] ? alloc_netdev_mqs+0xee6/0x1290 [ 2809.293699][T11110] ? rtnl_create_link+0xa6d/0xfd0 [ 2809.298741][T11110] ? veth_set_features+0x2d0/0x2d0 [ 2809.303859][T11110] __rtnl_newlink+0x1173/0x1930 [ 2809.308739][T11110] ? rtnl_link_unregister+0x260/0x260 [ 2809.314164][T11110] rtnl_newlink+0x67/0xa0 [ 2809.318535][T11110] ? __rtnl_newlink+0x1930/0x1930 [ 2809.323572][T11110] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2809.328543][T11110] ? rtnl_getlink+0xb40/0xb40 [ 2809.333245][T11110] netlink_rcv_skb+0x16b/0x440 [ 2809.338013][T11110] ? rtnl_getlink+0xb40/0xb40 [ 2809.342705][T11110] ? netlink_ack+0x1370/0x1370 [ 2809.348011][T11110] ? netlink_deliver_tap+0x1a0/0xd00 [ 2809.353306][T11110] netlink_unicast+0x53b/0x810 [ 2809.358081][T11110] ? netlink_attachskb+0x880/0x880 [ 2809.363198][T11110] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2809.369104][T11110] ? __phys_addr_symbol+0x30/0x70 [ 2809.374138][T11110] ? __check_object_size+0x323/0x730 [ 2809.379451][T11110] netlink_sendmsg+0x93c/0xe40 [ 2809.384230][T11110] ? netlink_unicast+0x810/0x810 [ 2809.389182][T11110] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2809.394471][T11110] ? netlink_unicast+0x810/0x810 [ 2809.399415][T11110] __sock_sendmsg+0xd5/0x180 [ 2809.404017][T11110] ____sys_sendmsg+0x6ac/0x940 [ 2809.408803][T11110] ? copy_msghdr_from_user+0x10b/0x160 [ 2809.414534][T11110] ? kernel_sendmsg+0x50/0x50 [ 2809.419231][T11110] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2809.425230][T11110] ___sys_sendmsg+0x135/0x1d0 [ 2809.430000][T11110] ? do_recvmmsg+0x740/0x740 [ 2809.434596][T11110] ? find_held_lock+0x2d/0x110 [ 2809.439408][T11110] ? __fget_light+0xe6/0x260 [ 2809.444014][T11110] __sys_sendmsg+0x117/0x1e0 [ 2809.448610][T11110] ? __sys_sendmsg_sock+0x30/0x30 [ 2809.453635][T11110] ? xfd_validate_state+0x5d/0x180 [ 2809.458774][T11110] ? syscall_enter_from_user_mode+0x26/0x80 [ 2809.464692][T11110] do_syscall_64+0x3f/0x110 [ 2809.469208][T11110] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2809.475122][T11110] RIP: 0033:0x7f6554c7cae9 [ 2809.479541][T11110] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2809.499156][T11110] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2809.507575][T11110] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2809.515550][T11110] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2809.523523][T11110] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2809.531495][T11110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2809.539467][T11110] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2809.547457][T11110] [ 2809.554996][T11110] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2809.628888][T11117] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c8, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:30 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x5000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:30 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000fc0)={0x2020}, 0x2020) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000000)=""/79, 0x50}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x10000018, 0x0) 20:50:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x1500, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1ffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:30 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x6000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:30 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000fc0)={0x2020}, 0x2020) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000000)=""/79, 0x50}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x10000018, 0x0) [ 2809.846730][T11125] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2809.895889][T11125] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2809.921956][T11125] CPU: 1 PID: 11125 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2809.932085][T11125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2809.942168][T11125] Call Trace: [ 2809.945471][T11125] [ 2809.948421][T11125] dump_stack_lvl+0x125/0x1b0 [ 2809.953134][T11125] sysfs_warn_dup+0x7f/0xa0 [ 2809.957703][T11125] sysfs_create_dir_ns+0x247/0x2a0 [ 2809.962937][T11125] ? sysfs_create_mount_point+0xb0/0xb0 [ 2809.968515][T11125] ? spin_bug+0x1d0/0x1d0 [ 2809.972890][T11125] ? net_namespace+0x12/0x40 [ 2809.977517][T11125] ? device_namespace+0x8d/0xc0 [ 2809.982404][T11125] kobject_add_internal+0x2c8/0x960 [ 2809.987653][T11125] kobject_add+0x16f/0x240 [ 2809.992106][T11125] ? kset_create_and_add+0x190/0x190 [ 2809.997431][T11125] ? do_raw_spin_unlock+0x173/0x230 [ 2810.002671][T11125] ? kobject_put+0xbe/0x440 [ 2810.007227][T11125] device_add+0x289/0x1aa0 [ 2810.011707][T11125] ? device_initialize+0x510/0x510 [ 2810.016856][T11125] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2810.023754][T11125] ? __init_waitqueue_head+0xca/0x150 [ 2810.029176][T11125] netdev_register_kobject+0x183/0x3f0 [ 2810.034683][T11125] register_netdevice+0xbdf/0x14a0 [ 2810.039845][T11125] ? unregister_netdevice_queue+0x3c0/0x3c0 20:50:30 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x7000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:30 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) mmap(&(0x7f00005ca000/0x3000)=nil, 0x3000, 0xa, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r8 = syz_open_dev$vbi(&(0x7f00000000c0), 0x2, 0x2) mmap(&(0x7f00005cc000/0x2000)=nil, 0x2000, 0x1, 0x110, r8, 0x677eb000) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) [ 2810.045783][T11125] veth_newlink+0x4ef/0xa00 [ 2810.050324][T11125] ? __kasan_kmalloc+0xa2/0xb0 [ 2810.055120][T11125] ? veth_set_features+0x2d0/0x2d0 [ 2810.060258][T11125] ? rtnl_create_link+0xc9c/0xfd0 [ 2810.065330][T11125] ? __rtnl_newlink+0x108a/0x1930 [ 2810.070410][T11125] ? rtnl_newlink+0x67/0xa0 [ 2810.075008][T11125] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2810.080246][T11125] ? alloc_netdev_mqs+0xee6/0x1290 [ 2810.085412][T11125] ? rtnl_create_link+0xa6d/0xfd0 [ 2810.090480][T11125] ? veth_set_features+0x2d0/0x2d0 [ 2810.095623][T11125] __rtnl_newlink+0x1173/0x1930 [ 2810.100533][T11125] ? rtnl_link_unregister+0x260/0x260 [ 2810.106072][T11125] rtnl_newlink+0x67/0xa0 [ 2810.110443][T11125] ? __rtnl_newlink+0x1930/0x1930 [ 2810.115515][T11125] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2810.120495][T11125] ? rtnl_getlink+0xb40/0xb40 [ 2810.125230][T11125] netlink_rcv_skb+0x16b/0x440 [ 2810.130031][T11125] ? rtnl_getlink+0xb40/0xb40 [ 2810.134750][T11125] ? netlink_ack+0x1370/0x1370 [ 2810.139566][T11125] ? netlink_deliver_tap+0x1a0/0xd00 [ 2810.144887][T11125] netlink_unicast+0x53b/0x810 [ 2810.149685][T11125] ? netlink_attachskb+0x880/0x880 [ 2810.154829][T11125] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2810.160846][T11125] ? __phys_addr_symbol+0x30/0x70 [ 2810.165907][T11125] ? __check_object_size+0x323/0x730 [ 2810.171238][T11125] netlink_sendmsg+0x93c/0xe40 [ 2810.176045][T11125] ? netlink_unicast+0x810/0x810 [ 2810.181023][T11125] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2810.186342][T11125] ? netlink_unicast+0x810/0x810 [ 2810.191320][T11125] __sock_sendmsg+0xd5/0x180 20:50:30 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\x12\x15\xc7 \r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3+#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x04\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x86\r\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x93\x03J\xff\x13l\x96\b\x1by\xeaT\xdd\xb3g6\x06\a\x00\x00\xc5e\x90\xc51\x8f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xcea\xcbf\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xa6\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\xfc\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\x00\x00\x00', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) r2 = syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x101280, 0x0) [ 2810.195948][T11125] ____sys_sendmsg+0x6ac/0x940 [ 2810.200751][T11125] ? copy_msghdr_from_user+0x10b/0x160 [ 2810.206237][T11125] ? kernel_sendmsg+0x50/0x50 [ 2810.210963][T11125] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2810.216991][T11125] ___sys_sendmsg+0x135/0x1d0 [ 2810.221702][T11125] ? do_recvmmsg+0x740/0x740 [ 2810.226326][T11125] ? find_held_lock+0x2d/0x110 [ 2810.231164][T11125] ? __fget_light+0xe6/0x260 [ 2810.235800][T11125] __sys_sendmsg+0x117/0x1e0 [ 2810.240422][T11125] ? __sys_sendmsg_sock+0x30/0x30 [ 2810.245560][T11125] ? xfd_validate_state+0x5d/0x180 [ 2810.250732][T11125] ? syscall_enter_from_user_mode+0x26/0x80 [ 2810.256680][T11125] do_syscall_64+0x3f/0x110 [ 2810.261222][T11125] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2810.267161][T11125] RIP: 0033:0x7f6554c7cae9 [ 2810.271602][T11125] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 20:50:30 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x8000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2810.291245][T11125] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2810.299702][T11125] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2810.307704][T11125] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2810.315702][T11125] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2810.323702][T11125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2810.331699][T11125] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2810.339720][T11125] [ 2810.389245][T11125] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:31 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x48000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f4, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x1f00, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:31 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\x12\x15\xc7 \r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3+#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x04\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x86\r\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x93\x03J\xff\x13l\x96\b\x1by\xeaT\xdd\xb3g6\x06\a\x00\x00\xc5e\x90\xc51\x8f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xcea\xcbf\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xa6\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\xfc\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\x00\x00\x00', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x101280, 0x0) (async) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x101280, 0x0) 20:50:31 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x4c000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:31 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x68000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2810.784685][T11163] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2810.810974][T11163] CPU: 1 PID: 11163 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2810.821109][T11163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2810.831212][T11163] Call Trace: [ 2810.834514][T11163] [ 2810.837470][T11163] dump_stack_lvl+0x125/0x1b0 [ 2810.842195][T11163] sysfs_warn_dup+0x7f/0xa0 [ 2810.846749][T11163] sysfs_create_dir_ns+0x247/0x2a0 [ 2810.851892][T11163] ? sysfs_create_mount_point+0xb0/0xb0 [ 2810.857468][T11163] ? spin_bug+0x1d0/0x1d0 [ 2810.861839][T11163] ? net_namespace+0x12/0x40 [ 2810.866470][T11163] ? device_namespace+0x8d/0xc0 [ 2810.871354][T11163] kobject_add_internal+0x2c8/0x960 [ 2810.876593][T11163] kobject_add+0x16f/0x240 [ 2810.881047][T11163] ? kset_create_and_add+0x190/0x190 [ 2810.886364][T11163] ? do_raw_spin_unlock+0x173/0x230 [ 2810.891606][T11163] ? kobject_put+0xbe/0x440 [ 2810.896157][T11163] device_add+0x289/0x1aa0 [ 2810.900612][T11163] ? device_initialize+0x510/0x510 [ 2810.905757][T11163] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2810.912642][T11163] ? __init_waitqueue_head+0xca/0x150 [ 2810.918067][T11163] netdev_register_kobject+0x183/0x3f0 [ 2810.923585][T11163] register_netdevice+0xbdf/0x14a0 [ 2810.928743][T11163] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2810.934687][T11163] veth_newlink+0x4ef/0xa00 [ 2810.939234][T11163] ? veth_set_features+0x2d0/0x2d0 [ 2810.944368][T11163] ? rtnl_create_link+0xc9c/0xfd0 [ 2810.949435][T11163] ? __rtnl_newlink+0x108a/0x1930 [ 2810.954500][T11163] ? rtnl_newlink+0x67/0xa0 [ 2810.959105][T11163] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2810.964344][T11163] ? alloc_netdev_mqs+0xee6/0x1290 [ 2810.969508][T11163] ? rtnl_create_link+0xa6d/0xfd0 [ 2810.974571][T11163] ? veth_set_features+0x2d0/0x2d0 [ 2810.979710][T11163] __rtnl_newlink+0x1173/0x1930 [ 2810.984628][T11163] ? rtnl_link_unregister+0x260/0x260 [ 2810.990080][T11163] rtnl_newlink+0x67/0xa0 [ 2810.994452][T11163] ? __rtnl_newlink+0x1930/0x1930 [ 2810.999517][T11163] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2811.004495][T11163] ? rtnl_getlink+0xb40/0xb40 [ 2811.009226][T11163] netlink_rcv_skb+0x16b/0x440 [ 2811.014024][T11163] ? rtnl_getlink+0xb40/0xb40 [ 2811.018743][T11163] ? netlink_ack+0x1370/0x1370 [ 2811.023559][T11163] ? netlink_deliver_tap+0x1a0/0xd00 [ 2811.028882][T11163] netlink_unicast+0x53b/0x810 [ 2811.033736][T11163] ? netlink_attachskb+0x880/0x880 [ 2811.038872][T11163] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2811.044799][T11163] ? __phys_addr_symbol+0x30/0x70 [ 2811.049853][T11163] ? __check_object_size+0x323/0x730 [ 2811.055188][T11163] netlink_sendmsg+0x93c/0xe40 [ 2811.059986][T11163] ? netlink_unicast+0x810/0x810 [ 2811.064959][T11163] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2811.070271][T11163] ? netlink_unicast+0x810/0x810 [ 2811.075234][T11163] __sock_sendmsg+0xd5/0x180 [ 2811.079864][T11163] ____sys_sendmsg+0x6ac/0x940 [ 2811.084667][T11163] ? copy_msghdr_from_user+0x10b/0x160 [ 2811.090155][T11163] ? kernel_sendmsg+0x50/0x50 [ 2811.094874][T11163] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2811.100911][T11163] ___sys_sendmsg+0x135/0x1d0 [ 2811.105620][T11163] ? do_recvmmsg+0x740/0x740 [ 2811.110234][T11163] ? find_held_lock+0x2d/0x110 [ 2811.115062][T11163] ? __fget_light+0xe6/0x260 [ 2811.119691][T11163] __sys_sendmsg+0x117/0x1e0 [ 2811.124318][T11163] ? __sys_sendmsg_sock+0x30/0x30 [ 2811.129369][T11163] ? xfd_validate_state+0x5d/0x180 [ 2811.134547][T11163] ? syscall_enter_from_user_mode+0x26/0x80 [ 2811.140487][T11163] do_syscall_64+0x3f/0x110 [ 2811.145030][T11163] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2811.150963][T11163] RIP: 0033:0x7f6554c7cae9 [ 2811.155412][T11163] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2811.175230][T11163] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:50:31 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) (async) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) (async) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) (async) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) mmap(&(0x7f00005ca000/0x3000)=nil, 0x3000, 0xa, 0x28011, r1, 0x0) socket$rxrpc(0x21, 0x2, 0xa) (async) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r8 = syz_open_dev$vbi(&(0x7f00000000c0), 0x2, 0x2) mmap(&(0x7f00005cc000/0x2000)=nil, 0x2000, 0x1, 0x110, r8, 0x677eb000) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 20:50:31 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\x12\x15\xc7 \r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3+#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x04\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x86\r\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x93\x03J\xff\x13l\x96\b\x1by\xeaT\xdd\xb3g6\x06\a\x00\x00\xc5e\x90\xc51\x8f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xcea\xcbf\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xa6\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\xfc\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\x00\x00\x00', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) r2 = syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x101280, 0x0) memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\x12\x15\xc7 \r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3+#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x04\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x86\r\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x93\x03J\xff\x13l\x96\b\x1by\xeaT\xdd\xb3g6\x06\a\x00\x00\xc5e\x90\xc51\x8f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xcea\xcbf\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xa6\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\xfc\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\x00\x00\x00', 0x6) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) (async) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) (async) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x101280, 0x0) (async) [ 2811.183686][T11163] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2811.191695][T11163] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2811.199707][T11163] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2811.207710][T11163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2811.215715][T11163] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2811.223741][T11163] 20:50:31 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x6c000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2811.259991][T11163] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2811.363492][T11170] __nla_validate_parse: 2 callbacks suppressed [ 2811.363513][T11170] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x74000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x2000, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) 20:50:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fd, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x7a000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:32 executing program 2: pipe(&(0x7f0000000140)) (async) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) openat(r1, &(0x7f0000002b40)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20042, 0x0) mmap(&(0x7f00005ca000/0x3000)=nil, 0x3000, 0xa, 0x28011, r1, 0x0) (async) r2 = socket$rxrpc(0x21, 0x2, 0xa) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async, rerun: 64) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) (async) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r8 = syz_open_dev$vbi(&(0x7f00000000c0), 0x2, 0x2) mmap(&(0x7f00005cc000/0x2000)=nil, 0x2000, 0x1, 0x110, r8, 0x677eb000) (async, rerun: 32) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) (async, rerun: 32) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 20:50:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x7ffffff7, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2811.713879][T11193] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2811.766605][T11193] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2811.800805][T11193] CPU: 0 PID: 11193 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2811.810935][T11193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2811.821017][T11193] Call Trace: [ 2811.824319][T11193] [ 2811.827269][T11193] dump_stack_lvl+0x125/0x1b0 [ 2811.831983][T11193] sysfs_warn_dup+0x7f/0xa0 [ 2811.836531][T11193] sysfs_create_dir_ns+0x247/0x2a0 [ 2811.841672][T11193] ? sysfs_create_mount_point+0xb0/0xb0 [ 2811.847251][T11193] ? spin_bug+0x1d0/0x1d0 [ 2811.851623][T11193] ? net_namespace+0x12/0x40 [ 2811.856247][T11193] ? device_namespace+0x8d/0xc0 [ 2811.861138][T11193] kobject_add_internal+0x2c8/0x960 [ 2811.866379][T11193] kobject_add+0x16f/0x240 [ 2811.870835][T11193] ? kset_create_and_add+0x190/0x190 [ 2811.876161][T11193] ? do_raw_spin_unlock+0x173/0x230 [ 2811.881400][T11193] ? kobject_put+0xbe/0x440 [ 2811.885949][T11193] device_add+0x289/0x1aa0 [ 2811.890395][T11193] ? device_initialize+0x510/0x510 [ 2811.895547][T11193] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2811.902433][T11193] ? __init_waitqueue_head+0xca/0x150 [ 2811.907839][T11193] netdev_register_kobject+0x183/0x3f0 [ 2811.913312][T11193] register_netdevice+0xbdf/0x14a0 [ 2811.918432][T11193] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2811.924338][T11193] veth_newlink+0x4ef/0xa00 [ 2811.928851][T11193] ? veth_set_features+0x2d0/0x2d0 [ 2811.933962][T11193] ? rtnl_create_link+0xc9c/0xfd0 [ 2811.938997][T11193] ? __rtnl_newlink+0x108a/0x1930 [ 2811.944033][T11193] ? rtnl_newlink+0x67/0xa0 [ 2811.948601][T11193] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2811.953815][T11193] ? alloc_netdev_mqs+0xee6/0x1290 [ 2811.958944][T11193] ? rtnl_create_link+0xa6d/0xfd0 [ 2811.963980][T11193] ? veth_set_features+0x2d0/0x2d0 [ 2811.969182][T11193] __rtnl_newlink+0x1173/0x1930 [ 2811.974061][T11193] ? rtnl_link_unregister+0x260/0x260 [ 2811.979486][T11193] rtnl_newlink+0x67/0xa0 [ 2811.983830][T11193] ? __rtnl_newlink+0x1930/0x1930 [ 2811.988866][T11193] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2811.993824][T11193] ? rtnl_getlink+0xb40/0xb40 [ 2811.998524][T11193] netlink_rcv_skb+0x16b/0x440 [ 2812.003295][T11193] ? rtnl_getlink+0xb40/0xb40 [ 2812.007986][T11193] ? netlink_ack+0x1370/0x1370 [ 2812.012769][T11193] ? netlink_deliver_tap+0x1a0/0xd00 [ 2812.018066][T11193] netlink_unicast+0x53b/0x810 [ 2812.022846][T11193] ? netlink_attachskb+0x880/0x880 [ 2812.027957][T11193] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2812.033968][T11193] ? __phys_addr_symbol+0x30/0x70 [ 2812.038996][T11193] ? __check_object_size+0x323/0x730 [ 2812.044300][T11193] netlink_sendmsg+0x93c/0xe40 [ 2812.049075][T11193] ? netlink_unicast+0x810/0x810 [ 2812.054023][T11193] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2812.059316][T11193] ? netlink_unicast+0x810/0x810 [ 2812.064258][T11193] __sock_sendmsg+0xd5/0x180 [ 2812.068861][T11193] ____sys_sendmsg+0x6ac/0x940 [ 2812.073637][T11193] ? copy_msghdr_from_user+0x10b/0x160 [ 2812.079099][T11193] ? kernel_sendmsg+0x50/0x50 [ 2812.083801][T11193] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2812.089797][T11193] ___sys_sendmsg+0x135/0x1d0 [ 2812.094483][T11193] ? do_recvmmsg+0x740/0x740 [ 2812.099078][T11193] ? find_held_lock+0x2d/0x110 [ 2812.103880][T11193] ? __fget_light+0xe6/0x260 [ 2812.108484][T11193] __sys_sendmsg+0x117/0x1e0 [ 2812.113075][T11193] ? __sys_sendmsg_sock+0x30/0x30 [ 2812.118109][T11193] ? xfd_validate_state+0x5d/0x180 [ 2812.123248][T11193] ? syscall_enter_from_user_mode+0x26/0x80 [ 2812.129157][T11193] do_syscall_64+0x3f/0x110 [ 2812.133666][T11193] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2812.139573][T11193] RIP: 0033:0x7f6554c7cae9 [ 2812.143990][T11193] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2812.163602][T11193] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2812.172022][T11193] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2812.179996][T11193] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2812.187971][T11193] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2812.195949][T11193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2812.203918][T11193] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2812.211906][T11193] 20:50:32 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/snd_hda_core', 0x109340, 0x6e) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000002c0)={0x0, 0x0, "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", "7545137c5a8c8136763c180780877f6f9fac5a3e848ea1b5a57b55851e1c2f5b74df1e337893fa4a0d2f856ee2eda6667c45a1ffc0ba1fef67a07f1a24c78fe8e54149e8f45443e1e4b9f93bc25fdc09ee9975bcf11e977322a50c011af009438d49500426f348c8c2090c604dfe14e876d529c61ba4f0ed87339228eb388fc725b89e1026ef7a4cb78180fe4b1958416fbcbea79275117ed9ee8837aee7ea99de0e7e8bcb1e278945ffca516bff83f2698c96b065c930a71faf0d84cd14e923cdd04c61ec727208b34966fe6d14044b5752cfeec6906423e47f427a3b38f020bf9a3ab37f04f870fb1bc88ee7e76655483b3ff74085da81deb54060dd9b095e72ebaa36d4af51f1f90215c4cbce12b61b4bd1983b0e7e22dc21aadbbfd485124f1b88aec710fb120c764da974cfd302f47cb8c24ac90d934cf1a6029db7da264c29d628dac5bf91ea82f6c1f229fc3c95d9d0f6f37afa08438f8a984bba7dda43947b36d36c4772002b00cf1ddde75f945aca8c3eefefc0a9a124a66222feeff5b26626e41ca912e325f937bc20632d7b631226813d23dc5ed20a9e976da1eb0281dea1a74b8290c34a035f1b1f70f745226bfc8c8c95cbaf91505305bf18c96d3630f710ac178abb5bcfb7d964d2fc52150966be3c4d328fb60dc1454356be417323d3f362c790c9db0abab38874a9ef7e7bc0d7f8209864e893be819e7a9a015cf21464f7a9d5747e8cc1a82ceab4d65bf6577d31a053eed27ef398f2c3996cbcf4b84889e21b98b370800f272ad9096e4ee78d15566d0d870a0a38a1e912a6d7b0c6ce384dd10e869d71e03495bdaf7c0723bd3edd75249303368b79087182a8562b8274b170455b960b20ca291d869dd2ffc57421ecee56b11fec4c385b3eb28e421f3839fcef2e0f069308887b3596b127e0030b10b3633f1dff4b09486ec54c077ac51e0895580dcdfd74768f85783ed0bf3ebea535cf4c1e4f2562fe40952792f0d55557d4bcf29e5219a78f9e97fc4c9c01999fbd4d83baef682bf8b4f1253056398805b30fb558db9d84c57a001ab64905e0a17e5213b9a19d2153b86e0a47dfff8165972f3affbe0490e327980d58de959fc885810259d5914fb78523bde3c9ef39549d54d1ec079c3d1aec3baabb49adadc69bda2eacb9ff48e9744421cdeb86855188d515f2f19ff6314ee5cef14ba9ba2c874fe67b0dea9208a85ab2dbd20e2fd7783957ce059d2f24bc5341913900978e92f03756dfa5dd79380f4c9a0fc0872e623bff25eebf4e2dd8f775d80c2dcb85ed9630adbe6e2fd5a40cbf8ced9f95f693a9253146fb879e223ebb3f8275ce62971ff159887b4eba2400ae113c06b1bfd1369f69fb3784f7580a216581df95fef9f96254c050099d4205bde06845137dc4b68540db5395a75cc717a76d7a16e7d7bdae4cc67c88874759a1c202cc95a3eb82b12fd912956675246b96d375ca30f7e8823fbfd7cdfe1a57901e05f61f5a235539dcbea88da2cc8e897c1f1721c90aaa16162f5d5a7f8e0f0f9e1d113d76a2a694e1342ea93868ef04f8c50c1eea3a1b9497916b39f78d41fa33e9f47f2eaa13118ea7f79f69639eb2300d73621da9f62df0c1c8369be0b10c8a1a1b1c2f420370467e0a7fe6e787f7dab0662d94b56d4537c6d7d2f50489bd44115affda0b8b0711e1542bdf52ac2f7ccacb15b98996dfb0ab4f6c094778693db333e513be2e2b1123b299d458f70073865ef39f1582558cb63493c3aae74d419dbbdb852c0900f55d49cb3f33f32d9de47456c6e103d3848be59c046ca8ce926c8c82ab3fe48babc13d0b0eff85296001c171ca7338a001543b10d6fc9cb75b6c29cc9fece986d45967676c9516a32c1f9f95dca8a70f2845eaa14193f2bedfb6a81cd4d8bf03f1b3b422d57fa8c658a3feb2bcc8b65f367f558162a77236e4f74772b61a741b529b224f61909b9ad8c888bd05b0ad6de620f7af248c20827c1f46c7ff717be2348cfee322d78b6c5537c7e2b70a70af2946c6f4f32a0854e36036b7b569cb5f37d7bd0920dbd37b09edcb86862af20615fb745cd4390588028bfaa28df3e165e54ddb73295d890aa23e4bc27803f5850ab7012bd2e4a49210340d8d56db14a8444b05616bbb1fbf5a6e6940c91b5cb7bf648c1f704bf2801a3c796ae96f06351a7f1384be4228e750073aee1acb313d13270ff7300fae966667b280420013a19b38d93369e11e01383b0127c6984f3e47256304a97252f70c71331c59932de7eb7cdb91fd08aa992c59cc8ff392860cc96d3c3b692f206bc92539a29e3e7ae5394814bbf68713090a59c177699e9db4da29692069b820b99fcee7e2e15ae98a2c8fae997cb3159da193410fd1a987911291e77e7132e62a8a67753e855e9e52e358efff5de32f001aef7f21f1d1fe62f1a311b59762d50664fe6df9319a3b81ae0d9addc073eb359575ee174c8320d126ad847754da6a1325be5a7a047b743c031536e71259db7f427661a242c3204c6f1b1efa65f57963d0b56e444c54236d9913906b711d7b6f4ae65133f37f4fb6e06aec1dcc37ac659b84ec4dad49f64261c5c1e4502810211dc45b5296c5569f57d0cb9cdd502f5f9ff3168754cf99459b90f0a2379d9fefdb80c8f9fd5c66b273d118dffea6d73c05b8dc77cfd81e32ce06794b3bef59816c8a960415d6df7b397458ebb8933e6e76332661645225710e4190d6b6805c4cd93e63c38b886911cf1630f02c6e71f55349af16e891ad7945c6b4bdfd1af93fce881931073bbed5d138d952a6cf1a14f86161353b65ed50fe13f3724532fcadceecbb72a9de0822a2a6bdbf69e1f56754dc3ced89c766545d2590a74ee047c04beca11284752b9e82ca092a121aaebedf782d170c0e2358242c253ed5387082519c3cf56e3e5b39690d6f64a576a67dfb4488df26d4e43404bbdd167b55414fa4e6466551a3ce01f962f093c8f4ba20562b51b12dab6e9aea5d313758fd108ace0934dfa3b18758a928af61ee2a1dba2c55eab169049281318655d621268d284340a6f7420016315addfea95ae986bfe91e0bd90529787bb312a7c1ccd69477a9785aecfab4906c9671463a48087868be0c5bbc56b870558daaa82df9d7079e4e1fd9a3a86f9e76e682021dec1e85c364072bb76f8120f71de5f4cfd9b9d9246ebad9cad4d81ac77a67345c2b65ec9b7cb5cf9ccc926834b1503f39727f7e96fb95ec0e97115978e645a302da350ad127c02b267123c70ef672c9660e421bc9ad5e991fe90a7114fc35e2bca1ab3ed580bf956d8faac00a4604ea30d791ab3cf2e95cd46347a60be2893332f1e569660dfe614be1c5dfd216304a03eda473fc97b7cd94744ef8ddb60957972cd161e03f3c4d8134c61e206b3994217f699a68a07e88de30b9bb73eb1ea4210ece8c29ac308d5440394278f71bc24ed16a0ba3844470a19f5bc8d04b7faf8512fc35346ac0ffafbc93f92cfd87137ed7e8f854e986065919bd6ae327a689a6d4d0140d562b96a97bc7a16c7d5fcd3d0d459ff14dfb0b418e4efc5a6c76d1ad6318284f58941b3e1df94a28090b3deadd88b2c5dadf795a2536a4384ae1406ca7e474d1e0aaacd5a0448a9e3f9a02a11cd474d85a40f132612ff89847cfc470362856132b0f93d585d65b6f27efa827ef9d580dc13b313e4c97cd62b003c35411ccf800192fd6e69bca9b04307331811238a5b453af11e6c00c63619c205b5d1d9b625375c5cfdaa397a61c09db482dcf9d53b27c7b31bcc090ff882ddb9e399725e695ad295dafb315eec02fc9351f77501d3010f396dff70f3a3bdbe8ae8b438c8b61cfd5f59e4c0df5b32d7cb608822286033d9fa0a26044eba354ade901a8f5a224a9d4376f5dab3f9c6a7c7dabcd62f8584dfd22d9a991f9fb4a7b0928269305890f59d5116a06c9b06c14389d83f78fd2c8b38115f2ae65e1994f4586f256f070d1359cd012958c32e2f20f3a44af82c3f1b94e54443fbb702141b8efbfa197d9df85f861b38226167e3c9f9e2a104dc5cd05da67ae9f9ed6d75b4bd38ddb39d5c290d8fed0b5cb7eb2ef3c35d49063f396053d6ef7f5428249d4750cb61d0acc747ed5820a881a59d46687699f396510b10fe4b9e414aca252eb98e9d80e73d47212e9c167809a468c180b75ca4361d97f09fdc1f65920d04a62fc2605e0b72b2f723e77a4d7e1516c25eb9c30b78823199d6a6aec44eaacbc8513e3d9e303c5408a21d4697f6457dde8ce686b435d43a332b26829191e2abb0e9e8b79598ba589db516312ec0af0170dc9db93313689cd80fa746c32d715301c994a9ab92cfa92c7623ea9ecdb6369adcd1c6eebaadaf7d78eb58e7d78b3d86c99e30a58bcd8ef8862c91ce5ac38d0ef7ec5355f92e5d4ebc687b0b0dc928c4fe902b65360a659e943f861f9c7a8e11545295b3fa013b43cebfd3475ed1660f35ce4194962449e42dbdeb38293821c4c7591e12bf5640d66b137b10220622999d7be92f64c901f45e469904084d491fa138786311c3410a450355834e24a49506d1d42c3447a0856ef998b925d51437be40e5eaa950ada4058ff8408397e71c7830938920afde8e9770d029360f48704b2e3812d9680417147e165690792327b22668d51d90a6c01e1667e17d94ef4f02d15db96899c981fba49724d28e5d9c5990d671f92055fc31e478262e50491e6241b6c20bd6999336ac282948f2f1052ae7611111054ae2f47ec61cd1ae2305517664503b10ad511610c5b15e1f6b3da17a5583ae9a23fa9fc318d7a6049a6c4ed6dfa46262859dbff36a6c6da61f8269b387f4caf7249500dfe92c1a7d009702da1949c0d53feec971f1d6ef3b5c4d43b35337804d5ea06c764b9d8199f9ec83702cfe0bb1a95f9ad92092f165c2fddcea063bf06dec5e8a221eb24b2953a868541ada6b7db8046c4e78ece14a725b8889b2b68770a89afc362879f610de5f93022429da2bc0ccda25c22ae35b3e020ed8bf2f40108922a33ae61ffaf94aa3ef1eca9ef2a58146ac2d7bf9fe723b0f01632f693c1b80ed6975e21549e940ac462c9c4f042aca2c92e0b8b6d0ea289a4cafeff6fe5fdf4bb08d441e6eb6c18debb19ba6f55b3866197700580f8d5f0cee190bfd1a93ae5277474f86505f8047db5abd68fc3b623391e6963648f9066400f87262640b9f0bb19a8228129440ec6430a232926a74ad8069b7b0b747f3ca25438fa5174fcdb60b6b305c9a6c3a4429a7095c65ed9c1b18d7815966ba6ee88cbee562f861503d9f10e8bd1d7f771750729df04d3bb1bb1e6d796d93b1389976b9f8a10ea551d5b247769225030f39b4a69c621cd85703ae67465a8018aa6bdb7c3198f2ec201f137329ca782c7adf3a774bd"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x400000) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 20:50:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0xf7ffff7f, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) [ 2812.226880][T11193] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. 20:50:32 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x5, &(0x7f0000000140)={0x0, 0x25, 0x0, @thr={&(0x7f0000000000)="d04071ed09c772107ee14b13f5fe942ad23a850634fb77f643646f238074e709054ddf58a69cb22abe88b6c053c26d93c66cef02b9d2619b27dcb935501b0cfe2ff561f984596756d48b2ed1731147031319f029cf547353ca7995d008dbd083b8b5c28e6a0812f0ccf482ea66762260e2c3cbac19b6aecf3c9112fd14621943820ea85a2ec27e2d757da5d8394d44423106b28351fc98ac1f11f13d77c318cc0d15975417f7472f015b39b9467df3bb893e773a519065126dd82aa2c51ef0fe6672a27272164e", &(0x7f0000000100)="571b8753ab58427f3b9735a441fbe633c28ffa40fc"}}, &(0x7f0000000180)) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) 20:50:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0xffffff7f, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:33 executing program 2: pipe(&(0x7f0000000140)) (async) socket$netlink(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/snd_hda_core', 0x109340, 0x6e) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000002c0)={0x0, 0x0, "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", "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"}) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x400000) (async) r2 = socket$rxrpc(0x21, 0x2, 0xa) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) [ 2812.454730][T11199] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:33 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) timer_create(0x5, &(0x7f0000000140)={0x0, 0x25, 0x0, @thr={&(0x7f0000000000)="d04071ed09c772107ee14b13f5fe942ad23a850634fb77f643646f238074e709054ddf58a69cb22abe88b6c053c26d93c66cef02b9d2619b27dcb935501b0cfe2ff561f984596756d48b2ed1731147031319f029cf547353ca7995d008dbd083b8b5c28e6a0812f0ccf482ea66762260e2c3cbac19b6aecf3c9112fd14621943820ea85a2ec27e2d757da5d8394d44423106b28351fc98ac1f11f13d77c318cc0d15975417f7472f015b39b9467df3bb893e773a519065126dd82aa2c51ef0fe6672a27272164e", &(0x7f0000000100)="571b8753ab58427f3b9735a441fbe633c28ffa40fc"}}, &(0x7f0000000180)) process_vm_writev(r1, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/70, 0x46}], 0x1, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/138, 0x8a}], 0x1, 0x0) 20:50:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x2597, &(0x7f0000000180)={&(0x7f0000000480)=@newqdisc={0x64, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}, @TCA_RATE={0x4}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x64}}, 0x0) [ 2812.716247][T11234] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:50:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, [{0x0, 0x0, "ee7b615d"}, {}, {0x2b}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) 20:50:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x1000000000000, &(0x7f0000001240)=[@hopopts_2292={{0x11}}], 0x18}, 0x0) 20:50:33 executing program 2: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000003b40)='/sys/class/dmi', 0x0, 0x0) socket(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 32) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/snd_hda_core', 0x109340, 0x6e) (rerun: 32) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000002c0)={0x0, 0x0, "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", "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"}) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x400000) (async, rerun: 32) r2 = socket$rxrpc(0x21, 0x2, 0xa) (async, rerun: 32) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async, rerun: 64) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100005ac2200000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) (async, rerun: 32) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000700ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 20:50:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val={0x5, 0x0, 0x0, 0x0, 0x54}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "000003", 0x60, 0x3a, 0x0, @empty, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@empty]}], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80, 0x0, [{0x0, 0x0, "ee7b615d"}, {}, {0x2c}, {0x0, 0x5, "442911892704e813255133e4d2b8b863b5f5b4ace38952e94c581c85d2d86844f548415db4dbf1992868a2e1"}]}}}}}, 0xfdef) [ 2812.763014][T11234] sysfs: cannot create duplicate filename '/devices/virtual/net/veth10000000000' [ 2812.810714][T11234] CPU: 0 PID: 11234 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2812.820855][T11234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2812.830943][T11234] Call Trace: [ 2812.834244][T11234] [ 2812.837197][T11234] dump_stack_lvl+0x125/0x1b0 [ 2812.841914][T11234] sysfs_warn_dup+0x7f/0xa0 [ 2812.846466][T11234] sysfs_create_dir_ns+0x247/0x2a0 [ 2812.851608][T11234] ? sysfs_create_mount_point+0xb0/0xb0 [ 2812.857184][T11234] ? spin_bug+0x1d0/0x1d0 [ 2812.861554][T11234] ? net_namespace+0x12/0x40 [ 2812.866179][T11234] ? device_namespace+0x8d/0xc0 [ 2812.871066][T11234] kobject_add_internal+0x2c8/0x960 [ 2812.876312][T11234] kobject_add+0x16f/0x240 [ 2812.880765][T11234] ? kset_create_and_add+0x190/0x190 [ 2812.886084][T11234] ? do_raw_spin_unlock+0x173/0x230 [ 2812.891308][T11234] ? kobject_put+0xbe/0x440 [ 2812.895836][T11234] device_add+0x289/0x1aa0 [ 2812.900262][T11234] ? device_initialize+0x510/0x510 [ 2812.905387][T11234] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 2812.912245][T11234] ? __init_waitqueue_head+0xca/0x150 [ 2812.917633][T11234] netdev_register_kobject+0x183/0x3f0 [ 2812.923104][T11234] register_netdevice+0xbdf/0x14a0 [ 2812.928226][T11234] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 2812.934132][T11234] veth_newlink+0x4ef/0xa00 [ 2812.938643][T11234] ? veth_set_features+0x2d0/0x2d0 [ 2812.943777][T11234] ? rtnl_create_link+0xc9c/0xfd0 [ 2812.948836][T11234] ? __rtnl_newlink+0x108a/0x1930 [ 2812.953889][T11234] ? rtnl_newlink+0x67/0xa0 [ 2812.959933][T11234] ? __xdp_rxq_info_reg+0x18c/0x340 [ 2812.965149][T11234] ? alloc_netdev_mqs+0xee6/0x1290 [ 2812.970276][T11234] ? rtnl_create_link+0xa6d/0xfd0 [ 2812.975314][T11234] ? veth_set_features+0x2d0/0x2d0 [ 2812.980431][T11234] __rtnl_newlink+0x1173/0x1930 [ 2812.985307][T11234] ? rtnl_link_unregister+0x260/0x260 [ 2812.990726][T11234] rtnl_newlink+0x67/0xa0 [ 2812.995071][T11234] ? __rtnl_newlink+0x1930/0x1930 [ 2813.000112][T11234] rtnetlink_rcv_msg+0x3c7/0xe00 [ 2813.005066][T11234] ? rtnl_getlink+0xb40/0xb40 [ 2813.009772][T11234] netlink_rcv_skb+0x16b/0x440 [ 2813.014543][T11234] ? rtnl_getlink+0xb40/0xb40 [ 2813.019233][T11234] ? netlink_ack+0x1370/0x1370 [ 2813.024018][T11234] ? netlink_deliver_tap+0x1a0/0xd00 [ 2813.029321][T11234] netlink_unicast+0x53b/0x810 [ 2813.034104][T11234] ? netlink_attachskb+0x880/0x880 [ 2813.039254][T11234] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2813.045156][T11234] ? __phys_addr_symbol+0x30/0x70 [ 2813.050193][T11234] ? __check_object_size+0x323/0x730 [ 2813.055497][T11234] netlink_sendmsg+0x93c/0xe40 [ 2813.060272][T11234] ? netlink_unicast+0x810/0x810 [ 2813.065232][T11234] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 2813.070523][T11234] ? netlink_unicast+0x810/0x810 [ 2813.075470][T11234] __sock_sendmsg+0xd5/0x180 [ 2813.080162][T11234] ____sys_sendmsg+0x6ac/0x940 [ 2813.084944][T11234] ? copy_msghdr_from_user+0x10b/0x160 [ 2813.090408][T11234] ? kernel_sendmsg+0x50/0x50 [ 2813.095105][T11234] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2813.101110][T11234] ___sys_sendmsg+0x135/0x1d0 [ 2813.105886][T11234] ? do_recvmmsg+0x740/0x740 [ 2813.110480][T11234] ? find_held_lock+0x2d/0x110 [ 2813.115282][T11234] ? __fget_light+0xe6/0x260 [ 2813.119888][T11234] __sys_sendmsg+0x117/0x1e0 [ 2813.124487][T11234] ? __sys_sendmsg_sock+0x30/0x30 [ 2813.129518][T11234] ? __do_sys_rseq+0x750/0x750 [ 2813.134300][T11234] ? syscall_enter_from_user_mode+0x26/0x80 [ 2813.140211][T11234] do_syscall_64+0x3f/0x110 [ 2813.144723][T11234] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2813.150629][T11234] RIP: 0033:0x7f6554c7cae9 [ 2813.155052][T11234] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2813.174840][T11234] RSP: 002b:00007f65559a40c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2813.183258][T11234] RAX: ffffffffffffffda RBX: 00007f6554d9bf80 RCX: 00007f6554c7cae9 [ 2813.191229][T11234] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 2813.199201][T11234] RBP: 00007f6554cc847a R08: 0000000000000000 R09: 0000000000000000 [ 2813.207179][T11234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2813.215155][T11234] R13: 000000000000000b R14: 00007f6554d9bf80 R15: 00007f6554ebfa48 [ 2813.223145][T11234] [ 2813.264461][T11234] kobject: kobject_add_internal failed for veth10000000000 with -EEXIST, don't try to register things with the same name in the same directory. [ 2813.288180][T11237] general protection fault, probably for non-canonical address 0xdffffc000000001d: 0000 [#1] PREEMPT SMP KASAN [ 2813.299944][T11237] KASAN: null-ptr-deref in range [0x00000000000000e8-0x00000000000000ef] [ 2813.308369][T11237] CPU: 0 PID: 11237 Comm: syz-executor.0 Not tainted 6.6.0-syzkaller-14142-g90b0c2b2edd1 #0 [ 2813.318451][T11237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 2813.328520][T11237] RIP: 0010:__lock_acquire+0x109/0x5de0 [ 2813.334101][T11237] Code: 45 85 c9 0f 84 cc 0e 00 00 44 8b 05 91 b8 81 0b 45 85 c0 0f 84 be 0d 00 00 48 ba 00 00 00 00 00 fc ff df 4c 89 d1 48 c1 e9 03 <80> 3c 11 00 0f 85 e8 40 00 00 49 81 3a a0 c9 b4 90 0f 84 96 0d 00 [ 2813.353734][T11237] RSP: 0018:ffffc9000d817380 EFLAGS: 00010006 [ 2813.359806][T11237] RAX: ffff88807d6f5940 RBX: 1ffff92001b02ea0 RCX: 000000000000001d [ 2813.367778][T11237] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: 00000000000000e8 [ 2813.375743][T11237] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001 [ 2813.383708][T11237] R10: 00000000000000e8 R11: 0000000000000000 R12: 0000000000000000 [ 2813.391675][T11237] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 [ 2813.399652][T11237] FS: 00007f8bc730b6c0(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 2813.408591][T11237] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2813.415214][T11237] CR2: 0000000020000b80 CR3: 000000002023a000 CR4: 00000000003506f0 [ 2813.427181][T11237] Call Trace: [ 2813.430453][T11237] [ 2813.433380][T11237] ? show_regs+0x8f/0xa0 [ 2813.437626][T11237] ? die_addr+0x4f/0xd0 [ 2813.441791][T11237] ? exc_general_protection+0x154/0x230 [ 2813.447345][T11237] ? asm_exc_general_protection+0x26/0x30 [ 2813.453075][T11237] ? __lock_acquire+0x109/0x5de0 [ 2813.458055][T11237] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2813.464039][T11237] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2813.470029][T11237] ? is_bpf_text_address+0x8f/0x1a0 [ 2813.475231][T11237] ? reacquire_held_locks+0x4b0/0x4b0 [ 2813.480782][T11237] lock_acquire+0x1ae/0x510 [ 2813.485294][T11237] ? hugetlb_vma_lock_read+0xae/0x100 [ 2813.490680][T11237] ? lock_sync+0x190/0x190 [ 2813.495103][T11237] ? preempt_count_sub+0x150/0x150 [ 2813.500309][T11237] down_read+0x9c/0x470 [ 2813.504471][T11237] ? hugetlb_vma_lock_read+0xae/0x100 [ 2813.509848][T11237] ? down_write_killable+0x250/0x250 [ 2813.515139][T11237] ? print_usage_bug.part.0+0x670/0x670 [ 2813.520694][T11237] hugetlb_vma_lock_read+0xae/0x100 [ 2813.525897][T11237] hugetlb_follow_page_mask+0x15b/0x10b0 [ 2813.531545][T11237] follow_page_mask+0x49e/0xda0 [ 2813.536393][T11237] ? check_vma_flags+0x36e/0x600 [ 2813.541334][T11237] __get_user_pages+0x366/0x1480 [ 2813.546270][T11237] ? follow_page_mask+0xda0/0xda0 [ 2813.551295][T11237] __gup_longterm_locked+0x278/0x2ab0 [ 2813.556673][T11237] ? get_user_pages_unlocked+0x770/0x770 [ 2813.562308][T11237] ? lock_sync+0x190/0x190 [ 2813.566733][T11237] pin_user_pages_remote+0xee/0x140 [ 2813.571928][T11237] ? __gup_longterm_locked+0x2ab0/0x2ab0 [ 2813.577565][T11237] process_vm_rw_core.constprop.0+0x43d/0xa10 [ 2813.583638][T11237] ? vmalloc_dump_obj+0x290/0x290 [ 2813.588672][T11237] process_vm_rw+0x2ff/0x360 [ 2813.593261][T11237] ? process_vm_rw_core.constprop.0+0xa10/0xa10 [ 2813.599509][T11237] ? rcu_is_watching+0x12/0xb0 [ 2813.604287][T11237] ? folio_memcg_unlock+0x280/0x280 [ 2813.609497][T11237] __x64_sys_process_vm_writev+0xe2/0x1b0 [ 2813.615216][T11237] ? syscall_enter_from_user_mode+0x26/0x80 [ 2813.621118][T11237] do_syscall_64+0x3f/0x110 [ 2813.625625][T11237] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2813.631525][T11237] RIP: 0033:0x7f8bc667cae9 [ 2813.635935][T11237] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2813.655539][T11237] RSP: 002b:00007f8bc730b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 2813.663949][T11237] RAX: ffffffffffffffda RBX: 00007f8bc679bf80 RCX: 00007f8bc667cae9 [ 2813.676777][T11237] RDX: 0000000000000001 RSI: 0000000020000b80 RDI: 0000000000002fde [ 2813.684743][T11237] RBP: 00007f8bc66c847a R08: 0000000000000001 R09: 0000000000000000 [ 2813.692711][T11237] R10: 0000000020000f80 R11: 0000000000000246 R12: 0000000000000000 [ 2813.700675][T11237] R13: 000000000000000b R14: 00007f8bc679bf80 R15: 00007f8bc68bfa48 [ 2813.708649][T11237] [ 2813.711658][T11237] Modules linked in: [ 2813.715546][T11237] ---[ end trace 0000000000000000 ]--- [ 2813.720991][T11237] RIP: 0010:__lock_acquire+0x109/0x5de0 [ 2813.726546][T11237] Code: 45 85 c9 0f 84 cc 0e 00 00 44 8b 05 91 b8 81 0b 45 85 c0 0f 84 be 0d 00 00 48 ba 00 00 00 00 00 fc ff df 4c 89 d1 48 c1 e9 03 <80> 3c 11 00 0f 85 e8 40 00 00 49 81 3a a0 c9 b4 90 0f 84 96 0d 00 [ 2813.746164][T11237] RSP: 0018:ffffc9000d817380 EFLAGS: 00010006 [ 2813.752241][T11237] RAX: ffff88807d6f5940 RBX: 1ffff92001b02ea0 RCX: 000000000000001d [ 2813.760218][T11237] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: 00000000000000e8 [ 2813.768187][T11237] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001 [ 2813.776153][T11237] R10: 00000000000000e8 R11: 0000000000000000 R12: 0000000000000000 [ 2813.784117][T11237] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 [ 2813.792083][T11237] FS: 00007f8bc730b6c0(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 2813.801012][T11237] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2813.807594][T11237] CR2: 0000000020000b80 CR3: 000000002023a000 CR4: 00000000003506f0 [ 2813.815565][T11237] Kernel panic - not syncing: Fatal exception [ 2813.821796][T11237] Kernel Offset: disabled [ 2813.826105][T11237] Rebooting in 86400 seconds..